Ninja Hacking and over 2 million other books are available for Amazon Kindle . Learn more

Sign in to turn on 1-Click ordering.
More Buying Choices
Have one to sell? Sell yours here
Sorry, this item is not available in
Image not available for
Image not available

Start reading Ninja Hacking on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Ninja Hacking [Paperback]

Thomas Wilhelm
4.0 out of 5 stars  See all reviews (1 customer review)
RRP: 30.99
Price: 26.14 & FREE Delivery in the UK. Details
You Save: 4.85 (16%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Only 2 left in stock (more on the way).
Dispatched from and sold by Amazon. Gift-wrap available.
Want it Monday, 14 July? Choose Express delivery at checkout. Details


Amazon Price New from Used from
Kindle Edition 24.83  
Paperback 26.14  

Book Description

27 Oct 2010 1597495883 978-1597495882

Ever thought of using the time-tested tactics and techniques of a ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does by thinking outside of the box with these unorthodox techniques. Use all of the tools that the ninja has at his side such as disguise, espionage, stealth, and concealment. Learn how to benefit from these by laying your plans, impersonating employees, infiltrating via alarm system evasion, discovering weak points and timing, spyware and keylogging software, and log manipulation and logic bombs. And, really, don't you want to be a ninja for a day just because they're cool? Let this book be your excuse!

  • Use the tactics of a ninja such as disguise, espionage, stealth, and concealment to protect your company's assets

  • Details unorthodox penetration testing techniques by thinking outside of the box and inside the mind of a ninja

  • Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks

Special Offers and Product Promotions

  • Spend 30 and get Norton 360 21.0 - 3 Computers, 1 Year 2014 for 24.99. Here's how (terms and conditions apply)

Frequently Bought Together

Ninja Hacking + Coding for Penetration Testers: Building Better Tools
Buy the selected items together

Product details

  • Paperback: 450 pages
  • Publisher: Syngress (27 Oct 2010)
  • Language: English
  • ISBN-10: 1597495883
  • ISBN-13: 978-1597495882
  • Product Dimensions: 2.3 x 18.8 x 22.8 cm
  • Average Customer Review: 4.0 out of 5 stars  See all reviews (1 customer review)
  • Amazon Bestsellers Rank: 861,910 in Books (See Top 100 in Books)

More About the Authors

Discover books, learn about writers, and more.

Product Description


"The hacking community is fraught with Eastern military comparisons. Like the ninja, we are continuing to come out of the shadows of our communal origins and grow into respected members of a larger society. As our industry matures, it demands more formal education, strict regulations and an adherence to a code of ethics. Therefore it becomes increasingly difficult to incorporate the culture of the unconventional warrior into our new world. Enter Wilhelm and Andress, who make it safe to show off your fu again. By the end of this book, the security professional is given the philosophical foundation along with a practical framework from which to leverage the way of the ninja. What could be cooler?"--Overall, Ninja Hacking has excellent relevant material and a significant amount of Ninja lore and history. While this book is not a technical reference, it is an excellent choice for someone who has an interest in Ninjas or someone who is looking for inspiration to think differently about penetration testing and security concepts. The mappings for traditional Ninja skills to the skills of today are mostly well-coupled and are always relevant to how the leaders in the field are addressing security today."----Donald C. Donzal, Editor-in-Chief, The Ethical Hacker Network "When they put "unconventional" in the title, the authors weren't exaggerating. Perhaps the most unusual book written on computer security, this volume centers around detailed descriptions of the ethics, mindset, and tactics used in the Japanese martial arts commonly called ninja. The history of ninja fighting arts and the samurai warriors who practiced them are described in the first chapter. Each subsequent chapter presents specific ninja tactics, including intelligence, use of weapons, surveillance, and sabotage, then applies them to effective computer security management. Both authors are computer security specialists. The book also benefits from a Ninjutsu consultant, Bryan R. Garner, and a technical editor, Joshua Abraham."--SciTechBookNews "With the good blend of historical techniques and its modern day application there is something in here for everyone."--Hakin9 "Be in no doubt, credibility is high for this book..All in all, while the writing style is light, the content is, for lack of a better term, meaty. This is definitely not recommended as an entry level book, but it is an excellent resource for penetration testers and those thinking of commissioning pen tests on their systems."--Paul Baccas,, Oct. 25, 2011,

About the Author

Thomas Wilhelm has been in involved in Information Security since 1990, when he served in the Army for eight years as a Signals Intelligence Analyst, Russian Linguist, and Cryptanalyst. A speaker at security conferences across the U.S., he is employed by a Fortune 500 company to conduct Risk Assessments, participate and lead in external and internal Penetration Testing efforts, and manage Information Systems Security projects. Wilhelm is also a doctoral student, holding a Masters degree in both Computer Science and Management, and has obtained the following certifications: ISSMP CISSP SCSECA SCNA SCSA IAM. Wilhelm dedicates some of his time as an Adjunct Professor at Colorado Technical University and contributes to multiple publications in his spare time, including Hakin9 magazine. His latest contributions include multiple chapters in the Syngress title Netcat Power Tools, his third book contribution to Syngress.

Jason Andress( ISSAP, CISSP, GISP, GSEC, CEH, Security+) is a seasoned security professional with a depth of experience in both the academic and business worlds. He is presently employed by a major software company, providing global information security oversight, performing penetration testing, risk assessment, and compliance functions to ensure that the company's assets are protected. Jason has taught undergraduate and graduate security courses since 2005 and holds a Doctorate in Computer Science. His research is in the area of data protection, and he has contributed to several publications, writing on topics including data security, network security, and digital forensics.

Inside This Book (Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

What Other Items Do Customers Buy After Viewing This Item?

Customer Reviews

5 star
3 star
2 star
1 star
4.0 out of 5 stars
4.0 out of 5 stars
Most Helpful Customer Reviews
4.0 out of 5 stars Not bad 6 Mar 2013
Format:Kindle Edition|Verified Purchase
Good informative book, however there are better on the market. I recommend hacking exposed 7 as the first port of call.
Comment | 
Was this review helpful to you?
Most Helpful Customer Reviews on (beta) 2.9 out of 5 stars  10 reviews
9 of 9 people found the following review helpful
4.0 out of 5 stars Who doesn't love a ninja ? 6 Mar 2011
By R. Linn - Published on
Without turning into a how-to manual, Wilhelm and Andress do a good job exposing the reader to the world of the Ninja and then mapping the cutting-edge skills of the leaders in penetration testing to those of the Zukin (the penetration tester who leverages unorthodox techniques). A good mix of history and hacking ensures even those who have no interest in the historical aspect will still get ideas for how to take penetration tests to the next level. This reference is broad enough to inspire almost everyone, but that breadth comes at the cost of not being deep enough to allow for expert mastery of any of the individual skills. By the end of this book the reader should know how to become the Ninja penetration tester and should be able to intelligently discuss the relationship between the feudal Ninja to the Ninjas of today.

The book is peppered with historical parables designed to shed light on modern security scenarios and stoke interest in the material. These scenarios may make explanation of aspects of penetration testing easier to understand for non-pentesters, and they should make experienced security experts think. The book covers a broad range of concepts, from contrasting the philosophies of the Ninja and Samurai classes using stories about specific feudal lords and clan leaders to examining the rules of engagement according to Sun Tzu's Art of War. Throughout, these researched components are not only used to examine concepts of penetration and defense but also to question the cookie-cutter methodologies found in many penetration tests. However, those who aren't interested in Ninjas can skip the first 2 chapters and go directly into the chapters about stealth and misdirection and will still be able to understand the references in most of the book.

By examining penetration testing using a point of view which is not bound by the traditional rules of war, Wilhelm and Andress are able to examine what sets apart traditional penetration testers from the leaders in the field. The authors do not focus on explicit programs or tools which grant the latter an advantage. Rather, they explain how the Zukin can achieve better results than a traditional penetration tester. Approaching a problem from the mindset of an intruder who wants to obtain access without being detected changes the field of play for penetration tests in significant ways that this book is not afraid to explore. Modern techniques for advanced information gathering, social engineering, misdirection, and even sabotage are defined as extensions of the Ninja philosophy for covert and open operational tactics. Discussion of disguise, impersonation, surveillance and social engineering begins with exploration of how these techniques were leveraged by the feudal warriors.

Overall, Ninja Hacking has excellent relevant material and a significant amount of Ninja lore and history. While this book is not a technical reference, it is an excellent choice for someone who has an interest in Ninjas or someone who is looking for inspiration to think differently about penetration testing and security concepts. The mappings for traditional Ninja skills to the skills of today are mostly well-coupled and are always relevant to how the leaders in the field are addressing security today.

Originally posted by me on [...]
11 of 12 people found the following review helpful
4.0 out of 5 stars Different than the "usual" security book 14 Jan 2011
By Andy F. - Published on
I had great time reading this book.
I mainly liked it because

- it is different than the 'usual' security books
- it never gets boring
- the historical parts were very interesting and educational
- it is extremely well structured
- it gives you a good sense of what is possible in hacking today
- it transports the methods and concepts of the ninjas into today's security (and hacking) world.

All in all I think it is a very good book to read and worth the time spend.
The combination of both parts (the technical and the historical) encourages the out-of-the-box thinking.
5 of 5 people found the following review helpful
4.0 out of 5 stars Ninja Hacking - Unconventional Penetration Testing Tactics and Techniques 10 May 2011
By Mario Camilien - Published on
Book Title: Ninja Hacking - Unconventional Penetration Testing Tactics and Techniques
Reviewer: Mario Camilien, CISSP
Authors: Thomas Wilhelm and Jason Andress

Ninja hacking will continue to be a very good reference book. The process of using Social Engineering as a tool to exploit human weaknesses will continue to be enhanced. There are many ways Social Engineering attacks can be crafted. Attacks are often successful because attackers exploit our human frailties. Social Engineers are often playing on peoples' fear, vanity, and curiosity. The authors have pinpointed those areas in many good examples such the ones outlined below:

- loss of job
- loss of insurance
- mergers
- current events
- academic achievements

After reading the Ninja hacking book, one will come to the conclusion that human's ability to use techniques to accomplish a stated objective is limitless. One must never assume and rely on pre-conceived notions about individuals, locations, and organizations. The methods are not new. Social Engineering is the process of using technology as vehicle to revive and enhancing old tactics.

Mario Camilien, CISSP
7 of 8 people found the following review helpful
4.0 out of 5 stars Unusual security book that appeals to history-minded readers 28 July 2011
By Richard Bejtlich - Published on
Ninja Hacking is not a typical digital security book. When I saw the title I expected the use of "Ninja" to be a reference to a style of digital attack. While this is true to a certain extent, Ninja Hacking is about actual Ninja concepts applied to the digital world. The book is an introduction to Ninja history and techniques, applied to the modern digital security context. That was not at all what I expected, but I found the result intriguing.

Ninja Hacking is well-written and coherent, with real effort made to thoroughly apply Ninja tenets to digital problems. Unusual for a book of this sort, Ninja Hacking is well-sourced (using endnotes) and surprisingly well integrated into other Syngress titles. Rather than rehash or summarize material published elsewhere, the Ninja Hacking authors are comfortable directing readers to previous works for more information on topics like managing a penetration test. This approach kept Ninja Hacking focused and relevant.

My primary critique of the book is that some of the comparison between Ninja and modern digital intruders seems forced. For example, p 20 says "black hats simply do not have the financial backing that white hats have." The authors state this to maintain their perceived similarity between Ninjas and black hats. However, that financial outlook is not true for many black hats. Multiple teams of black hats are exceptionally well-funded compared to the 1-person or no-person security operations at the hundreds of thousands of small-to-medium businesses exploited each year. Some well-resourced black hats work for organized crime groups, while others are state-sponsored. Thankfully, this one aspect of the authors' philosophy doesn't really impact the book's core message.

Overall, I like Ninja Hacking more for the discussions of ancient Japan than for the application to digital security. Still, perhaps others will be inspired to make comparisons between military and quasi-military forces of old and modern digital actors?
5.0 out of 5 stars Fun and inspiring 21 May 2013
By ITPro - Published on
Format:Kindle Edition|Verified Purchase
If you're trying to drag your way through the OSSTMM, trying to memorise the never ending topics in CEH or CISSP exams, or spending your days hoping to find just one open port and wondering what for, you need a mental caffeine hit and this book is just the shot.
If you don't know the first thing about hacking and want a good read, this book will entertain you.
If you've read every other security book under the sun, you will find this entertaining, and perhaps it will inspire you to be a bit more creative in life and in work.
If you just think Ninja are cool and just want another book about them you'll find the history section fascinating.
The main premise of this book is to think differently. That is, after all, what the rogue hacker will do, and quite frankly any book that even mentions water boarding in the context of penetration testing gets a big cheesy grin from me =|D-
When I should have been reading much more boring books this one made me smile, and didn't take me off topic at all, although it's not a technical how to for hackers in any sense, but that's a good thing! I'm looking forward to having the time to sit on a tropical beach somewhere and read this again.
Thanks for a good read guys.
Were these reviews helpful?   Let us know
Search Customer Reviews
Only search this product's reviews

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
First post:
Prompts for sign-in

Search Customer Discussions
Search all Amazon discussions

Look for similar items by category