undrgrnd Cliquez ici Toys KDP nav-sa-clothing-shoes nav-sa-clothing-shoes Cloud Drive Photos Beauty Cliquez ici Acheter Fire Shop Kindle cliquez_ici Jeux Vidéo Gifts
Ninja Hacking et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus
  • Tous les prix incluent la TVA.
Il ne reste plus que 1 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon. Emballage cadeau disponible.
Quantité :1
Ninja Hacking: Unconventi... a été ajouté à votre Panier
+ EUR 2,99 (livraison)
D'occasion: Bon | Détails
Vendu par Deal FR
État: D'occasion: Bon
Commentaire: Ce livre a été lu mais il est toujours en bon état. 100% garanti.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 2 images

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques (Anglais) Broché – 2 novembre 2010

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
"Veuillez réessayer"
EUR 41,09
EUR 30,68 EUR 30,97

Idées cadeaux Livres Idées cadeaux Livres

Idées cadeaux Livres
Retrouvez toutes nos idées cadeaux dans notre Boutique Livres de Noël.

Offres spéciales et liens associés

Descriptions du produit

Revue de presse

"The hacking community is fraught with Eastern military comparisons. Like the ninja, we are continuing to come out of the shadows of our communal origins and grow into respected members of a larger society. As our industry matures, it demands more formal education, strict regulations and an adherence to a code of ethics. Therefore it becomes increasingly difficult to incorporate the culture of the unconventional warrior into our new world. Enter Wilhelm and Andress, who make it safe to show off your fu again. By the end of this book, the security professional is given the philosophical foundation along with a practical framework from which to leverage the way of the ninja. What could be cooler?"--Overall, Ninja Hacking has excellent relevant material and a significant amount of Ninja lore and history. While this book is not a technical reference, it is an excellent choice for someone who has an interest in Ninjas or someone who is looking for inspiration to think differently about penetration testing and security concepts. The mappings for traditional Ninja skills to the skills of today are mostly well-coupled and are always relevant to how the leaders in the field are addressing security today."----Donald C. Donzal, Editor-in-Chief, The Ethical Hacker Network

"When they put "unconventional" in the title, the authors weren't exaggerating. Perhaps the most unusual book written on computer security, this volume centers around detailed descriptions of the ethics, mindset, and tactics used in the Japanese martial arts commonly called ninja. The history of ninja fighting arts and the samurai warriors who practiced them are described in the first chapter. Each subsequent chapter presents specific ninja tactics, including intelligence, use of weapons, surveillance, and sabotage, then applies them to effective computer security management. Both authors are computer security specialists. The book also benefits from a Ninjutsu consultant, Bryan R. Garner, and a technical editor, Joshua Abraham."--SciTechBookNews

"With the good blend of historical techniques and its modern day application there is something in here for everyone."--Hakin9

"Be in no doubt, credibility is high for this book..All in all, while the writing style is light, the content is, for lack of a better term, meaty. This is definitely not recommended as an entry level book, but it is an excellent resource for penetration testers and those thinking of commissioning pen tests on their systems."--Paul Baccas, NakedSecurity.com, Oct. 25, 2011,

Présentation de l'éditeur

Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, the historical Ninjutsu techniques in particular, with the present hacking methodologies.
The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzus The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed.
Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gathering and interrogation, surveillance, and sabotage. The book concludes by presenting ways to hide the attack locations and activities.
This book will be of great value not only to penetration testers and security professionals, but also to network and system administrators.

  • Discusses techniques used by malicious attackers in real-world situations
  • Details unorthodox penetration testing techniques by getting inside the mind of a ninja
  • Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.

Détails sur le produit

En savoir plus sur les auteurs

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre

(En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index
Rechercher dans ce livre:

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 12 commentaires
9 internautes sur 9 ont trouvé ce commentaire utile 
Who doesn't love a ninja ? 6 mars 2011
Par R. Linn - Publié sur Amazon.com
Format: Broché
Without turning into a how-to manual, Wilhelm and Andress do a good job exposing the reader to the world of the Ninja and then mapping the cutting-edge skills of the leaders in penetration testing to those of the Zukin (the penetration tester who leverages unorthodox techniques). A good mix of history and hacking ensures even those who have no interest in the historical aspect will still get ideas for how to take penetration tests to the next level. This reference is broad enough to inspire almost everyone, but that breadth comes at the cost of not being deep enough to allow for expert mastery of any of the individual skills. By the end of this book the reader should know how to become the Ninja penetration tester and should be able to intelligently discuss the relationship between the feudal Ninja to the Ninjas of today.

The book is peppered with historical parables designed to shed light on modern security scenarios and stoke interest in the material. These scenarios may make explanation of aspects of penetration testing easier to understand for non-pentesters, and they should make experienced security experts think. The book covers a broad range of concepts, from contrasting the philosophies of the Ninja and Samurai classes using stories about specific feudal lords and clan leaders to examining the rules of engagement according to Sun Tzu's Art of War. Throughout, these researched components are not only used to examine concepts of penetration and defense but also to question the cookie-cutter methodologies found in many penetration tests. However, those who aren't interested in Ninjas can skip the first 2 chapters and go directly into the chapters about stealth and misdirection and will still be able to understand the references in most of the book.

By examining penetration testing using a point of view which is not bound by the traditional rules of war, Wilhelm and Andress are able to examine what sets apart traditional penetration testers from the leaders in the field. The authors do not focus on explicit programs or tools which grant the latter an advantage. Rather, they explain how the Zukin can achieve better results than a traditional penetration tester. Approaching a problem from the mindset of an intruder who wants to obtain access without being detected changes the field of play for penetration tests in significant ways that this book is not afraid to explore. Modern techniques for advanced information gathering, social engineering, misdirection, and even sabotage are defined as extensions of the Ninja philosophy for covert and open operational tactics. Discussion of disguise, impersonation, surveillance and social engineering begins with exploration of how these techniques were leveraged by the feudal warriors.

Overall, Ninja Hacking has excellent relevant material and a significant amount of Ninja lore and history. While this book is not a technical reference, it is an excellent choice for someone who has an interest in Ninjas or someone who is looking for inspiration to think differently about penetration testing and security concepts. The mappings for traditional Ninja skills to the skills of today are mostly well-coupled and are always relevant to how the leaders in the field are addressing security today.

Originally posted by me on [...]
11 internautes sur 12 ont trouvé ce commentaire utile 
Different than the "usual" security book 14 janvier 2011
Par Andy F. - Publié sur Amazon.com
Format: Broché
I had great time reading this book.
I mainly liked it because

- it is different than the 'usual' security books
- it never gets boring
- the historical parts were very interesting and educational
- it is extremely well structured
- it gives you a good sense of what is possible in hacking today
- it transports the methods and concepts of the ninjas into today's security (and hacking) world.

All in all I think it is a very good book to read and worth the time spend.
The combination of both parts (the technical and the historical) encourages the out-of-the-box thinking.
5 internautes sur 5 ont trouvé ce commentaire utile 
Ninja Hacking - Unconventional Penetration Testing Tactics and Techniques 10 mai 2011
Par Mario Camilien - Publié sur Amazon.com
Format: Broché
Book Title: Ninja Hacking - Unconventional Penetration Testing Tactics and Techniques
Reviewer: Mario Camilien, CISSP
Authors: Thomas Wilhelm and Jason Andress

Ninja hacking will continue to be a very good reference book. The process of using Social Engineering as a tool to exploit human weaknesses will continue to be enhanced. There are many ways Social Engineering attacks can be crafted. Attacks are often successful because attackers exploit our human frailties. Social Engineers are often playing on peoples' fear, vanity, and curiosity. The authors have pinpointed those areas in many good examples such the ones outlined below:

- loss of job
- loss of insurance
- mergers
- current events
- academic achievements

After reading the Ninja hacking book, one will come to the conclusion that human's ability to use techniques to accomplish a stated objective is limitless. One must never assume and rely on pre-conceived notions about individuals, locations, and organizations. The methods are not new. Social Engineering is the process of using technology as vehicle to revive and enhancing old tactics.

Mario Camilien, CISSP
7 internautes sur 8 ont trouvé ce commentaire utile 
Unusual security book that appeals to history-minded readers 28 juillet 2011
Par Richard Bejtlich - Publié sur Amazon.com
Format: Broché
Ninja Hacking is not a typical digital security book. When I saw the title I expected the use of "Ninja" to be a reference to a style of digital attack. While this is true to a certain extent, Ninja Hacking is about actual Ninja concepts applied to the digital world. The book is an introduction to Ninja history and techniques, applied to the modern digital security context. That was not at all what I expected, but I found the result intriguing.

Ninja Hacking is well-written and coherent, with real effort made to thoroughly apply Ninja tenets to digital problems. Unusual for a book of this sort, Ninja Hacking is well-sourced (using endnotes) and surprisingly well integrated into other Syngress titles. Rather than rehash or summarize material published elsewhere, the Ninja Hacking authors are comfortable directing readers to previous works for more information on topics like managing a penetration test. This approach kept Ninja Hacking focused and relevant.

My primary critique of the book is that some of the comparison between Ninja and modern digital intruders seems forced. For example, p 20 says "black hats simply do not have the financial backing that white hats have." The authors state this to maintain their perceived similarity between Ninjas and black hats. However, that financial outlook is not true for many black hats. Multiple teams of black hats are exceptionally well-funded compared to the 1-person or no-person security operations at the hundreds of thousands of small-to-medium businesses exploited each year. Some well-resourced black hats work for organized crime groups, while others are state-sponsored. Thankfully, this one aspect of the authors' philosophy doesn't really impact the book's core message.

Overall, I like Ninja Hacking more for the discussions of ancient Japan than for the application to digital security. Still, perhaps others will be inspired to make comparisons between military and quasi-military forces of old and modern digital actors?
Fun and inspiring 21 mai 2013
Par ITPro - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
If you're trying to drag your way through the OSSTMM, trying to memorise the never ending topics in CEH or CISSP exams, or spending your days hoping to find just one open port and wondering what for, you need a mental caffeine hit and this book is just the shot.
If you don't know the first thing about hacking and want a good read, this book will entertain you.
If you've read every other security book under the sun, you will find this entertaining, and perhaps it will inspire you to be a bit more creative in life and in work.
If you just think Ninja are cool and just want another book about them you'll find the history section fascinating.
The main premise of this book is to think differently. That is, after all, what the rogue hacker will do, and quite frankly any book that even mentions water boarding in the context of penetration testing gets a big cheesy grin from me =|D-
When I should have been reading much more boring books this one made me smile, and didn't take me off topic at all, although it's not a technical how to for hackers in any sense, but that's a good thing! I'm looking forward to having the time to sit on a tropical beach somewhere and read this again.
Thanks for a good read guys.
Ces commentaires ont-ils été utiles ? Dites-le-nous

Rechercher des articles similaires par rubrique


Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?