Free Book Online
Book Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques


Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

2.2 (3501)

Log in to rate this item

    Available in PDF - DJVU Format | Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques.pdf | Language: ENGLISH
    Jason Andress(Contributor)

    Book details

Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, the historical Ninjutsu techniques in particular, with the present hacking methodologies. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzus The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed. Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gathering and interrogation, surveillance, and sabotage. The book concludes by presenting ways to hide the attack locations and activities. This book will be of great value not only to penetration testers and security professionals, but also to network and system administrators.

2.2 (5654)
  • Pdf

*An electronic version of a printed book that can be read on a computer or handheld device designed specifically for this purpose.

Formats for this Ebook

Required Software Any PDF Reader, Apple Preview
Supported Devices Windows PC/PocketPC, Mac OS, Linux OS, Apple iPhone/iPod Touch.
# of Devices Unlimited
Flowing Text / Pages Pages
Printable? Yes

Book details

  • PDF | 336 pages
  • Jason Andress(Contributor)
  • Syngress (23 Sept. 2010)
  • English
  • 5
  • Computing & Internet

Read online or download a free book: Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques


Review Text

  • By Bird is the Word on 6 March 2013

    Good informative book, however there are better on the market. I recommend hacking exposed 7 as the first port of call.

  • Name:
    The message text*: