SlideShare uma empresa Scribd logo
1 de 35
Ninjitsu Attack: Hack for Fun and
                 Profit
Prathan Phongthiproek
ACIS Professional Center
Information Security Consultant
May 24th, 2009
What I’ve done ?
 Penetration Testing (BlackBox and WhiteBox)

 Security Consultant

 Active Security Researcher for Fun (and Profit)

 Devoted Hacker

 Exploits and Vulnerabilities Disclosure
  (CWH Underground)

 Hacking and Security Papers (WebApp, Wireless, OS)

 Comments, Feedback ? >> prathan.ptr@gmail.com
  (Don’t spam mail !! lol)

                                    #w
                                    03:19:18 up 1 min, 1 user, load average: 1.73, 0.71, 0.26
                                    USER                  TTY FROM         LOGIN@ IDLE JCPU PCPU
                                    prathan phongthiproek tty1 -           03:18      0.00s 0.08s 0.01s
Overview
 Exploit CMS Vulnerabilities

 Web Browser’s Passive Attack

 Wifi-Ninjitsu Attack For Profit

 Lock Picking: Owned The Key

 Other Techniques (Something Evil)
Exploit CMS Vulnerabilities
A content management system (CMS) is computer application used to
  create, edit, manage, and publish content in a consistently organized
                                fashion.
Exploit CMS Vulnerabilities
Exploit CMS Vulnerabilities
Exploit CMS Vulnerabilities
Exploit CMS Vulnerabilities
Exploit CMS Vulnerabilities



                       target com index php?option com_us
                       er&view reset&layout confirm
Exploit CMS Vulnerabilities
Exploit CMS Vulnerabilities
How to protect CMS Hacking
 Obey the Installer, and Remove /installation directory after install.

 Security Issues are primarily caused by faulty third-party extensions.

 Monitor HTTPD logs, bandwidth logs, and search terms for your
  site, in addition to traditional Linux intrusion detection & defense
  techniques to catch emerging threats before they hit your site.

 Always patch New Version !!
Web Browser’s Passive Attack
   Vulnerability in Windows Animated Cursor Handling
Web Browser’s Passive Attack
Web Browser’s Passive Attack
'Internet Explorer 7 Uninitialized Memory Corruption Vulnerability'
Web Browser’s Passive Attack
    “Can we use Active Attack ?? >> ARP Poisoning”
Wifi-Ninjitsu Attack For Profit
 Rouge AP (Evil Twin): Steal usernames, passwords and information
  from public wireless hotspots.

 Why we don’t steal something evil like credit card (Pay to Play) ??

 Can we Exploit victim machine through Web Browser Vuln or MS08-
  067 (Conficker Worms) ??
Wifi-Ninjitsu Attack For Profit

 Rouge AP (Evil Twin): Steal usernames, passwords and
       information from public wireless hotspots.
Wifi-Ninjitsu Attack For Profit

  Can we Exploit victim machine through Web Browser
         Vuln or MS08-067 (Conficker Worms) ??
Lock Picking: Owned The Key
 Locks are not complicated mechanisms

 Most locks are wildly easy to pick

 Unpickable doesn’t mean invulnerable
Lock Picking: Owned The Key
Lock Picking: Owned The Key
Lock Picking: Owned The Key
Lock Picking: Owned The Key
Lock Picking: Owned The Key
Lock Picking: Owned The Key
Lock Picking: Owned The Key
Lock Picking: Owned The Key
Lock Picking: Owned The Key
Lock Picking: Owned The Key
Lock Picking: Owned The Key
           It’s typically as simple as that
Lock Picking: Owned The Key
Lock Picking: Owned The Key
Other Techniques (Something Evil)
If someone is still in the room.. Q&A

          THANK YOU

Mais conteúdo relacionado

Mais procurados

Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hackingSahil Rai
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingzing12345
 
Password Cracking
Password CrackingPassword Cracking
Password CrackingSagar Verma
 
Cybersecurity Essentials - Part 1
Cybersecurity Essentials - Part 1Cybersecurity Essentials - Part 1
Cybersecurity Essentials - Part 1Shobhit Sharma
 
Website attack n defacement n its control measures
Website attack n defacement n its control measures Website attack n defacement n its control measures
Website attack n defacement n its control measures أحلام انصارى
 
DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayDTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayShah Sheikh
 
KeyLoggers - beating the shit out of keyboard since quite a long time
KeyLoggers - beating the shit out of keyboard since quite a long timeKeyLoggers - beating the shit out of keyboard since quite a long time
KeyLoggers - beating the shit out of keyboard since quite a long timen|u - The Open Security Community
 
Web defacement
Web defacementWeb defacement
Web defacementstudent
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute forcevishalgohel12195
 
Basic Introduction to hacking
Basic Introduction to hackingBasic Introduction to hacking
Basic Introduction to hackingSainath Volam
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingNeel Kamal
 
2. rats (trojans) (cyber awareness series)
2. rats (trojans) (cyber awareness series)2. rats (trojans) (cyber awareness series)
2. rats (trojans) (cyber awareness series)Isaac Feliciano
 
The Basics of Ethical Hacking
The Basics of Ethical HackingThe Basics of Ethical Hacking
The Basics of Ethical HackingVamshi TG
 
Hardware key logger
Hardware key loggerHardware key logger
Hardware key loggerTamim1980
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Sumit Satam
 

Mais procurados (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Cybersecurity Essentials - Part 1
Cybersecurity Essentials - Part 1Cybersecurity Essentials - Part 1
Cybersecurity Essentials - Part 1
 
Website attack n defacement n its control measures
Website attack n defacement n its control measures Website attack n defacement n its control measures
Website attack n defacement n its control measures
 
DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayDTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job Way
 
KeyLoggers - beating the shit out of keyboard since quite a long time
KeyLoggers - beating the shit out of keyboard since quite a long timeKeyLoggers - beating the shit out of keyboard since quite a long time
KeyLoggers - beating the shit out of keyboard since quite a long time
 
Web defacement
Web defacementWeb defacement
Web defacement
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute force
 
Basic Introduction to hacking
Basic Introduction to hackingBasic Introduction to hacking
Basic Introduction to hacking
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
2. rats (trojans) (cyber awareness series)
2. rats (trojans) (cyber awareness series)2. rats (trojans) (cyber awareness series)
2. rats (trojans) (cyber awareness series)
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
The Basics of Ethical Hacking
The Basics of Ethical HackingThe Basics of Ethical Hacking
The Basics of Ethical Hacking
 
Hardware key logger
Hardware key loggerHardware key logger
Hardware key logger
 
Understanding Keylogger
Understanding KeyloggerUnderstanding Keylogger
Understanding Keylogger
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Destaque

Acta c.i. 30 09-2011 logo
Acta c.i. 30 09-2011 logoActa c.i. 30 09-2011 logo
Acta c.i. 30 09-2011 logooscargaliza
 
Plataforma Windows Azure (Cloud Computing)
Plataforma Windows Azure (Cloud Computing)Plataforma Windows Azure (Cloud Computing)
Plataforma Windows Azure (Cloud Computing)Marcelo Paiva
 
Once upon a time
Once upon a timeOnce upon a time
Once upon a timewatersz3
 
ירושלים מחיר השלום
ירושלים מחיר   השלוםירושלים מחיר   השלום
ירושלים מחיר השלוםhaimkarel
 
עונשים בצבא
עונשים בצבאעונשים בצבא
עונשים בצבאhaimkarel
 
Domingos ano xacobeo
Domingos ano xacobeoDomingos ano xacobeo
Domingos ano xacobeooscargaliza
 
Convenio hosteleria ourense 2011 2013
Convenio hosteleria ourense 2011 2013Convenio hosteleria ourense 2011 2013
Convenio hosteleria ourense 2011 2013oscargaliza
 
Convenio hosteleria ourense 2011 2013
Convenio hosteleria ourense 2011 2013Convenio hosteleria ourense 2011 2013
Convenio hosteleria ourense 2011 2013oscargaliza
 
Anexos acta ci 121106
Anexos acta ci 121106Anexos acta ci 121106
Anexos acta ci 121106oscargaliza
 
Stc anuncia veiga
Stc anuncia veigaStc anuncia veiga
Stc anuncia veigaoscargaliza
 
Intercentros carrefour
Intercentros carrefourIntercentros carrefour
Intercentros carrefouroscargaliza
 
ZFConf 2011: Behavior Driven Development в PHP и Zend Framework (Константин К...
ZFConf 2011: Behavior Driven Development в PHP и Zend Framework (Константин К...ZFConf 2011: Behavior Driven Development в PHP и Zend Framework (Константин К...
ZFConf 2011: Behavior Driven Development в PHP и Zend Framework (Константин К...ZFConf Conference
 

Destaque (20)

Acta c.i. 30 09-2011 logo
Acta c.i. 30 09-2011 logoActa c.i. 30 09-2011 logo
Acta c.i. 30 09-2011 logo
 
Peñaranda
PeñarandaPeñaranda
Peñaranda
 
Plataforma Windows Azure (Cloud Computing)
Plataforma Windows Azure (Cloud Computing)Plataforma Windows Azure (Cloud Computing)
Plataforma Windows Azure (Cloud Computing)
 
ลักษณะภูมิประเทศแอฟริกกาใหม่
ลักษณะภูมิประเทศแอฟริกกาใหม่ลักษณะภูมิประเทศแอฟริกกาใหม่
ลักษณะภูมิประเทศแอฟริกกาใหม่
 
Once upon a time
Once upon a timeOnce upon a time
Once upon a time
 
Asp Net Architecture
Asp Net ArchitectureAsp Net Architecture
Asp Net Architecture
 
ירושלים מחיר השלום
ירושלים מחיר   השלוםירושלים מחיר   השלום
ירושלים מחיר השלום
 
Convegno Ordine dei dottori commercialisti di Catania - Personal Branding
Convegno Ordine dei dottori commercialisti di Catania - Personal BrandingConvegno Ordine dei dottori commercialisti di Catania - Personal Branding
Convegno Ordine dei dottori commercialisti di Catania - Personal Branding
 
עונשים בצבא
עונשים בצבאעונשים בצבא
עונשים בצבא
 
Domingos ano xacobeo
Domingos ano xacobeoDomingos ano xacobeo
Domingos ano xacobeo
 
Convenio hosteleria ourense 2011 2013
Convenio hosteleria ourense 2011 2013Convenio hosteleria ourense 2011 2013
Convenio hosteleria ourense 2011 2013
 
Convenio hosteleria ourense 2011 2013
Convenio hosteleria ourense 2011 2013Convenio hosteleria ourense 2011 2013
Convenio hosteleria ourense 2011 2013
 
แบบนำเสนอผลงานวิชาการ
แบบนำเสนอผลงานวิชาการแบบนำเสนอผลงานวิชาการ
แบบนำเสนอผลงานวิชาการ
 
Vida por vidas
Vida por vidasVida por vidas
Vida por vidas
 
Anexos acta ci 121106
Anexos acta ci 121106Anexos acta ci 121106
Anexos acta ci 121106
 
Psdeg
PsdegPsdeg
Psdeg
 
Stc anuncia veiga
Stc anuncia veigaStc anuncia veiga
Stc anuncia veiga
 
Intercentros carrefour
Intercentros carrefourIntercentros carrefour
Intercentros carrefour
 
Πρόγραμμα Αγωγής Υγείας - 2012-2013
Πρόγραμμα Αγωγής Υγείας - 2012-2013Πρόγραμμα Αγωγής Υγείας - 2012-2013
Πρόγραμμα Αγωγής Υγείας - 2012-2013
 
ZFConf 2011: Behavior Driven Development в PHP и Zend Framework (Константин К...
ZFConf 2011: Behavior Driven Development в PHP и Zend Framework (Константин К...ZFConf 2011: Behavior Driven Development в PHP и Zend Framework (Константин К...
ZFConf 2011: Behavior Driven Development в PHP и Zend Framework (Константин К...
 

Semelhante a Barcamp 2009-Ninjitsu Attack Hack For Fun and Profit

Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9Geoff Pesimo
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_pptNarayanan
 
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpMitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpJoann Davis
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network SecurityHarish Chaudhary
 
cyber security presentation (1).pdf
cyber security presentation (1).pdfcyber security presentation (1).pdf
cyber security presentation (1).pdfw4tgrgdyryfh
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hackingWaseem Rauf
 
Ethical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingEthical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingsxkkjbzq2k
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII studentsAkiumi Hasegawa
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A DiscussionKaushik Patra
 
Module 5 (system hacking)
Module 5 (system hacking)Module 5 (system hacking)
Module 5 (system hacking)Wail Hassan
 
20101017 program analysis_for_security_livshits_lecture03_security
20101017 program analysis_for_security_livshits_lecture03_security20101017 program analysis_for_security_livshits_lecture03_security
20101017 program analysis_for_security_livshits_lecture03_securityComputer Science Club
 

Semelhante a Barcamp 2009-Ninjitsu Attack Hack For Fun and Profit (20)

Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_ppt
 
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpMitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 Aitp
 
Hack the hack
Hack the hackHack the hack
Hack the hack
 
Hacking tutorial
Hacking tutorialHacking tutorial
Hacking tutorial
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking In Detail
Hacking In DetailHacking In Detail
Hacking In Detail
 
cyber security presentation (1).pdf
cyber security presentation (1).pdfcyber security presentation (1).pdf
cyber security presentation (1).pdf
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
Ethical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingEthical hacking is a based on computer hacking
Ethical hacking is a based on computer hacking
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
Ethichack 2012
Ethichack 2012Ethichack 2012
Ethichack 2012
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A Discussion
 
Module 5 (system hacking)
Module 5 (system hacking)Module 5 (system hacking)
Module 5 (system hacking)
 
20101017 program analysis_for_security_livshits_lecture03_security
20101017 program analysis_for_security_livshits_lecture03_security20101017 program analysis_for_security_livshits_lecture03_security
20101017 program analysis_for_security_livshits_lecture03_security
 

Mais de Prathan Phongthiproek

The CARzyPire - Another Red Team Operation
The CARzyPire - Another Red Team OperationThe CARzyPire - Another Red Team Operation
The CARzyPire - Another Red Team OperationPrathan Phongthiproek
 
Cyber Kill Chain: Web Application Exploitation
Cyber Kill Chain: Web Application ExploitationCyber Kill Chain: Web Application Exploitation
Cyber Kill Chain: Web Application ExploitationPrathan Phongthiproek
 
OWASP Day - OWASP Day - Lets secure!
OWASP Day - OWASP Day - Lets secure! OWASP Day - OWASP Day - Lets secure!
OWASP Day - OWASP Day - Lets secure! Prathan Phongthiproek
 
Don't Trust, And Verify - Mobile Application Attacks
Don't Trust, And Verify - Mobile Application AttacksDon't Trust, And Verify - Mobile Application Attacks
Don't Trust, And Verify - Mobile Application AttacksPrathan Phongthiproek
 
Point-Of-Sale Hacking - 2600Thailand#20
Point-Of-Sale Hacking - 2600Thailand#20Point-Of-Sale Hacking - 2600Thailand#20
Point-Of-Sale Hacking - 2600Thailand#20Prathan Phongthiproek
 
OWASP Thailand-Beyond the Penetration Testing
OWASP Thailand-Beyond the Penetration TestingOWASP Thailand-Beyond the Penetration Testing
OWASP Thailand-Beyond the Penetration TestingPrathan Phongthiproek
 
Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]Prathan Phongthiproek
 
CDIC 2013-Mobile Application Pentest Workshop
CDIC 2013-Mobile Application Pentest WorkshopCDIC 2013-Mobile Application Pentest Workshop
CDIC 2013-Mobile Application Pentest WorkshopPrathan Phongthiproek
 
Web Application Firewall: Suckseed or Succeed
Web Application Firewall: Suckseed or SucceedWeb Application Firewall: Suckseed or Succeed
Web Application Firewall: Suckseed or SucceedPrathan Phongthiproek
 
Layer8 exploitation: Lock'n Load Target
Layer8 exploitation: Lock'n Load TargetLayer8 exploitation: Lock'n Load Target
Layer8 exploitation: Lock'n Load TargetPrathan Phongthiproek
 

Mais de Prathan Phongthiproek (20)

Mobile Defense-in-Dev (Depth)
Mobile Defense-in-Dev (Depth)Mobile Defense-in-Dev (Depth)
Mobile Defense-in-Dev (Depth)
 
The CARzyPire - Another Red Team Operation
The CARzyPire - Another Red Team OperationThe CARzyPire - Another Red Team Operation
The CARzyPire - Another Red Team Operation
 
Cyber Kill Chain: Web Application Exploitation
Cyber Kill Chain: Web Application ExploitationCyber Kill Chain: Web Application Exploitation
Cyber Kill Chain: Web Application Exploitation
 
Mobile App Hacking In A Nutshell
Mobile App Hacking In A NutshellMobile App Hacking In A Nutshell
Mobile App Hacking In A Nutshell
 
Jump-Start The MASVS
Jump-Start The MASVSJump-Start The MASVS
Jump-Start The MASVS
 
OWASP Mobile Top 10 Deep-Dive
OWASP Mobile Top 10 Deep-DiveOWASP Mobile Top 10 Deep-Dive
OWASP Mobile Top 10 Deep-Dive
 
The Hookshot: Runtime Exploitation
The Hookshot: Runtime ExploitationThe Hookshot: Runtime Exploitation
The Hookshot: Runtime Exploitation
 
Understanding ransomware
Understanding ransomwareUnderstanding ransomware
Understanding ransomware
 
OWASP Day - OWASP Day - Lets secure!
OWASP Day - OWASP Day - Lets secure! OWASP Day - OWASP Day - Lets secure!
OWASP Day - OWASP Day - Lets secure!
 
Don't Trust, And Verify - Mobile Application Attacks
Don't Trust, And Verify - Mobile Application AttacksDon't Trust, And Verify - Mobile Application Attacks
Don't Trust, And Verify - Mobile Application Attacks
 
Owasp Top 10 Mobile Risks
Owasp Top 10 Mobile RisksOwasp Top 10 Mobile Risks
Owasp Top 10 Mobile Risks
 
Point-Of-Sale Hacking - 2600Thailand#20
Point-Of-Sale Hacking - 2600Thailand#20Point-Of-Sale Hacking - 2600Thailand#20
Point-Of-Sale Hacking - 2600Thailand#20
 
OWASP Thailand-Beyond the Penetration Testing
OWASP Thailand-Beyond the Penetration TestingOWASP Thailand-Beyond the Penetration Testing
OWASP Thailand-Beyond the Penetration Testing
 
Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]
 
Hack and Slash: Secure Coding
Hack and Slash: Secure CodingHack and Slash: Secure Coding
Hack and Slash: Secure Coding
 
CDIC 2013-Mobile Application Pentest Workshop
CDIC 2013-Mobile Application Pentest WorkshopCDIC 2013-Mobile Application Pentest Workshop
CDIC 2013-Mobile Application Pentest Workshop
 
Web Application Firewall: Suckseed or Succeed
Web Application Firewall: Suckseed or SucceedWeb Application Firewall: Suckseed or Succeed
Web Application Firewall: Suckseed or Succeed
 
Layer8 exploitation: Lock'n Load Target
Layer8 exploitation: Lock'n Load TargetLayer8 exploitation: Lock'n Load Target
Layer8 exploitation: Lock'n Load Target
 
Advanced Malware Analysis
Advanced Malware AnalysisAdvanced Malware Analysis
Advanced Malware Analysis
 
Tisa mobile forensic
Tisa mobile forensicTisa mobile forensic
Tisa mobile forensic
 

Barcamp 2009-Ninjitsu Attack Hack For Fun and Profit