Cyberjutsu
Cybersecurity for the Modern Ninja
by Ben McCarty
San Francisco
CYBERJUTSU. Copyright 2021 by Ben McCarty .
All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher.
ISBN-13: 978-1-7185-0054-9 (print)
ISBN-13: 978-1-7185-0055-6 (ebook)
Publisher: William Pollock
Executive Editor: Barbara Yien
Production Editor: Rachel Monaghan
Developmental Editors: Nic Albert and Athabasca Witschi
Project Editor: Dapinder Dosanjh
Cover Design: Octopod Studios
Cover Illustrator: Rick Reese
Technical Reviewer: Ari Schloss
Copyeditor: Paula L. Fleming
Interior Design and Composition: Maureen Forys, Happenstance Type-O-Rama
Proofreader: Holly Bauer Forsyth
Indexer: Beth Nauman-Montana
For information on book distributors or translations, please contact No Starch Press, Inc. directly:
No Starch Press, Inc.
245 8th Street, San Francisco, CA 94103
phone: 1-415-863-9900; info@nostarch.com
www.nostarch.com
Library of Congress Cataloging-in-Publication Data
Names: McCarty, Ben, author.
Title: Cyberjutsu : cybersecurity for the modern ninja / Ben McCarty.
Description: San Francisco, CA : No Starch Press, [2021] | Includes
bibliographical references and index. | Summary: Teaches ancient
approaches to modern information security issues based on authentic,
formerly classified ninja scrolls-- Provided by publisher.
Identifiers: LCCN 2020052832 (print) | LCCN 2020052833 (ebook) | ISBN
9781718500549 (print) | ISBN 9781718500556 (ebook)
Subjects: LCSH: Computer security. | Computer networks--Security measures.
| Computer crimes--Prevention. | Ninjutsu.
Classification: LCC QA76.9.A25 M4249 2021 (print) | LCC QA76.9.A25
(ebook) | DDC 005.8--dc23
LC record available at https://lccn.loc.gov/2020052832
LC ebook record available at https://lccn.loc.gov/2020052833
No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. Other product and company names mentioned herein may be the trademarks of their respective owners. Rather than use a trademark symbol with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark.
The information in this book is distributed on an As Is basis, without warranty. While every precaution has been taken in the preparation of this work, neither the author nor No Starch Press, Inc. shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in it.
To my lovely Sarah
and to those helpless organizations
afraid of new ideas
and blind to their own weaknesses
for motivating me to write this book
About the Author
Ben McCarty is an ex-NSA developer and US Army veteran. He is one of the first fully qualified Cyber Warfare Specialists (35Q) to serve in the Army Network Warfare Battalion. During his career, he has worked as a hacker, incident handler, threat hunter, malware analyst, network security engineer, compliance auditor, threat intelligence professional, and capability developer. He holds multiple security patents and certifications. He is currently a quantum security researcher in the Washington, DC, area.
About the Technical Reviewer
Ari Schloss started his cybersecurity career with the federal government at the IRS and has contracted with DHS and CMS (Medicare). He has experience in NIST 800-53/800-171 compliance, cybersecurity defense operations, and forensics. He has a masters degree in Information Assurance and an MBA. He currently serves as a security engineer at a defense contractor in Maryland.
Foreword
Cybersecurity has never been this critical to our economic prosperity and social peace. The need to protect our businesses intellectual property and peoples personal information is of utmost importance. Cybercriminals are getting faster, more creative, more organized, and more resourceful. Cybersecurity practitioners find themselves constantly discovering new threats and responding to new attacks, despite all the cyberdefense measures they have already taken. Its a cyber arms race.
In the 200 or so pages that follow, Benjamin McCarty, a brilliant cyber threat intelligence expert and an innovative security researcher whom I have known since 2017, shares how to protect your information from cyberhackers. Bens main message is simple: think like a ninja. But what about this message justifies writing an entire book? For the full and thorough answer, you just have to read it. But I can tell you that, at a high level, the answer lies in the tactics and techniques that ninjas use to wage warfare.
When I was in graduate school 15 years ago, the first security lesson I learned in my security engineering class was to think like a hacker. Within the cybersecurity community, we have been touting this message for several years, if not decades. But judging by the number of cyberattacks that organizations continue to undergo every year, this message does not seem to have sunk in for a large number of cyberdefenders. This is understandable for two reasons. First, the message is hard to internalize because of the lack of details. And second, any details available may be very hard to grasp. Ben addresses both issues by changing the message from Think like a hacker to Think like a ninja.
How? you might ask. Well, the answer lies in the ninja scrolls, which were scripted in medieval times but carefully kept secret until the mid-20th century. The scrolls were recently translated from Japanese to English. The translation reveals just how ninjas were trained to think, strategize, and act. Ninjas, being covert agents, cautiously kept their strategies and tactics secret. But the revelations made through the publication of their scrolls are worth a deep analysis to understand what made ninjas so successful in their espionage, deception, and surprise attack missions over centuries.
Bens analysis of these scrolls gleans the strategies, tactics, and techniques that ninjas used to conduct their attacks. He maps these ancient tactics and techniques to the modern-day tactics, techniques, and procedures (TTPs) used by hackers to conduct cyberattacks. Reading through the playbook and procedures will help security professionals understand not only how a ninja thinks, but also how a cybercriminal thinks. With that understanding, you will be able to develop the craft of really thinking like a hacker and internalizing that security principle. Not only will that help you predict the hackers potential next move, but it will also give you time to prepare for that move and build up your defenses to prevent the hacker from reaching their goal.
Another reason why Bens use of the ninja scrolls to bring these TTPs closer to cyberdefenders is a very smart approach is because these scrolls deal with attacks in the physical world; that is, they reference physical objects and describe movements within a physical environment. Physical environments are much easier for our brains to visualize than cyber or virtual environments. Thinking about the hackers tactics and techniques as they relate to tangible assets makes them more discernible. You can start envisaging how a hacker might apply a particular TTP to compromise one asset or move from one asset to another. In each chapter, Ben brilliantly takes you through a castle theory thought exercise to help you visualize those movements in a medieval castle and then translate them to a cyber environment.