<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: ipusiron</title>
    <description>The latest articles on Forem by ipusiron (@ipusiron).</description>
    <link>https://forem.com/ipusiron</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3810890%2F446cd532-b9c7-4d3a-9da9-a28faaf2f1e1.png</url>
      <title>Forem: ipusiron</title>
      <link>https://forem.com/ipusiron</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/ipusiron"/>
    <language>en</language>
    <item>
      <title>"Shinobi Rokugu" — What a Ninja's Everyday Carry Teaches Us About Physical Security</title>
      <dc:creator>ipusiron</dc:creator>
      <pubDate>Wed, 18 Mar 2026 13:34:29 +0000</pubDate>
      <link>https://forem.com/ipusiron/shinobi-rokugu-what-a-ninjas-everyday-carry-teaches-us-about-physical-security-5cma</link>
      <guid>https://forem.com/ipusiron/shinobi-rokugu-what-a-ninjas-everyday-carry-teaches-us-about-physical-security-5cma</guid>
      <description>&lt;h2&gt;
  
  
  The Principle: Hide in Plain Sight
&lt;/h2&gt;

&lt;p&gt;In &lt;a href="https://dev.to/ipusiron/what-is-a-cyber-ninja-the-world-of-full-stack-hacking-4m5k"&gt;my previous post&lt;/a&gt;, I introduced the concept of a "Cyber Ninja." Today, let's look at a concrete example of how ninja thinking applies to physical security.&lt;/p&gt;

&lt;p&gt;The key idea is simple: &lt;strong&gt;the best tools are the ones nobody notices you're carrying.&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Shinobi Rokugu: The Ninja's Six Tools
&lt;/h2&gt;

&lt;p&gt;Traditional ninja carried a standard loadout called &lt;em&gt;Shinobi Rokugu&lt;/em&gt; (忍び六具), documented in the ninja manual &lt;em&gt;Shoninki&lt;/em&gt; (正忍記, 1681). Six items, each designed for multiple uses:&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Uchitake (打竹) — Fire Starter
&lt;/h3&gt;

&lt;p&gt;A short bamboo tube with ventilation holes, holding a live ember inside. Used for lighting, cooking, smoke signals, warmth, and — when needed — arson. On night missions, it served as a portable light source.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Sanjaku Tenugui (三尺手拭) — The 91 cm Towel
&lt;/h3&gt;

&lt;p&gt;A large towel with surprisingly many uses: face cover, headband, bandage, and more. Most notably, it doubled as a water filter — scoop muddy water through the cloth to make it drinkable. It was sewn into clothing or tucked inside a belt, always within reach.&lt;/p&gt;

&lt;h3&gt;
  
  
  3. Sekihitsu (石筆) — Soapstone Pencil
&lt;/h3&gt;

&lt;p&gt;A writing tool made of soapstone. Marks could be erased easily and left no permanent trace. Ninja used it to leave coded messages for allies, draw maps of enemy fortifications, and later copy their findings into clean reports after the mission.&lt;/p&gt;

&lt;h3&gt;
  
  
  4. Kaginawa (鉤縄) — Hooked Rope
&lt;/h3&gt;

&lt;p&gt;A rope with a hook on the end, primarily for scaling walls and fences. But also used to secure small boats, restrain captives, and lock doors shut from the outside to trap enemies inside.&lt;/p&gt;

&lt;h3&gt;
  
  
  5. Inro (印籠) — Medicine Case
&lt;/h3&gt;

&lt;p&gt;A compact case carrying wound treatment, antidotes, sleeping drugs, insect repellent, poison — and salt. On long mountain missions, salt deficiency was a real threat. Stomach medicine was especially valued, since food poisoning could end a mission instantly.&lt;/p&gt;

&lt;h3&gt;
  
  
  6. Amigasa (編笠) — Woven Hat
&lt;/h3&gt;

&lt;p&gt;A wide-brimmed hat for sun and rain. But its real value was concealment: it hid the wearer's face from a distance. Small bows and arrows or secret documents could be tucked into the lining. Samurai, ronin, and wandering monks all wore the same style — a ninja wearing one wouldn't raise any suspicion.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Design Philosophy
&lt;/h2&gt;

&lt;p&gt;Here's what makes this loadout brilliant: &lt;strong&gt;every single item was an ordinary traveler's belonging.&lt;/strong&gt; An Edo-period travel guide called &lt;em&gt;Ryoko Yojinshu&lt;/em&gt; (旅行用心集) listed the exact same six items as recommended gear for the road. Nothing would look suspicious at a checkpoint.&lt;/p&gt;

&lt;p&gt;This wasn't accidental. Three deliberate design principles:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Blend in&lt;/strong&gt; — Use common items that don't attract attention.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Multi-purpose&lt;/strong&gt; — Every tool should serve at least two or three functions.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Always ready&lt;/strong&gt; — Keep everything on your person so you can depart at any time.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Same Philosophy, 400 Years Later
&lt;/h2&gt;

&lt;p&gt;Modern penetration testers follow the same principles in their everyday carry (EDC):&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Ninja Tool&lt;/th&gt;
&lt;th&gt;Modern EDC Equivalent&lt;/th&gt;
&lt;th&gt;Shared Principle&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Sekihitsu (coded messages)&lt;/td&gt;
&lt;td&gt;Encrypted USB drive&lt;/td&gt;
&lt;td&gt;Record intel without leaving traces&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Kaginawa (scaling walls)&lt;/td&gt;
&lt;td&gt;Tension wrench + picks&lt;/td&gt;
&lt;td&gt;Bypass physical barriers&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Amigasa (hiding identity)&lt;/td&gt;
&lt;td&gt;Fake badge / hi-vis vest&lt;/td&gt;
&lt;td&gt;Social camouflage&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Uchitake (multi-use fire)&lt;/td&gt;
&lt;td&gt;Multitool / Flipper Zero&lt;/td&gt;
&lt;td&gt;One device, many functions&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Inro (mission-critical meds)&lt;/td&gt;
&lt;td&gt;Backup battery + cables&lt;/td&gt;
&lt;td&gt;Keep your gear running&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Sanjaku Tenugui (improvised tool)&lt;/td&gt;
&lt;td&gt;Rubber ducky / LAN Turtle&lt;/td&gt;
&lt;td&gt;Looks innocent, does damage&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;A tension wrench looks like a hair clip. A USB Rubber Ducky looks like a regular flash drive. A hi-vis vest makes you invisible in a corporate building. &lt;strong&gt;400 years later, "hide in plain sight" is still the strongest play in physical security.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Ninja also built their own tools when nothing suitable existed — the same mindset as a hacker writing a custom exploit or soldering a purpose-built device.&lt;/p&gt;

&lt;h2&gt;
  
  
  What This Means for Developers
&lt;/h2&gt;

&lt;p&gt;You don't need to pick locks to benefit from this thinking. The ninja's EDC philosophy translates to security design:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Assume the attacker blends in.&lt;/strong&gt; Your badge system means nothing if someone walks in wearing a contractor vest.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Physical access beats digital defenses.&lt;/strong&gt; If your server room door can be shimmed open with a credit card, your firewall doesn't matter.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Multi-purpose attack tools exist.&lt;/strong&gt; A single USB device can be a keyboard, a network sniffer, and a data exfiltration tool.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  About Me
&lt;/h2&gt;

&lt;p&gt;I'm IPUSIRON, a security researcher and technical writer from Japan. 40+ published books on hacking, cryptography, and lock sport.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://akademeia.info/" rel="noopener noreferrer"&gt;akademeia.info&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://x.com/ipusiron" rel="noopener noreferrer"&gt;@ipusiron on X&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://ipusiron.github.io/book_Caesar_concise_en/" rel="noopener noreferrer"&gt;Free book: Caesar and Vigenere Cipher (English)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This post is part of my &lt;strong&gt;Cyber Ninja&lt;/strong&gt; series. The full picture is in my book: &lt;a href="https://www.amazon.co.jp/dp/B0DT4HF8QZ/" rel="noopener noreferrer"&gt;&lt;em&gt;Cyber Ninja: A Beginner's Guide&lt;/em&gt;&lt;/a&gt; (Japanese, Shoeisha, Jan 2026).&lt;/p&gt;




&lt;p&gt;&lt;em&gt;What's in your security EDC? Or: what's the most creative physical security bypass you've ever seen? Let me know in the comments.&lt;/em&gt; &lt;/p&gt;

</description>
      <category>security</category>
      <category>hacking</category>
      <category>ninja</category>
      <category>beginners</category>
    </item>
    <item>
      <title>What Is a "Cyber Ninja"? — The World of Full-Stack Hacking</title>
      <dc:creator>ipusiron</dc:creator>
      <pubDate>Thu, 12 Mar 2026 18:11:37 +0000</pubDate>
      <link>https://forem.com/ipusiron/what-is-a-cyber-ninja-the-world-of-full-stack-hacking-4m5k</link>
      <guid>https://forem.com/ipusiron/what-is-a-cyber-ninja-the-world-of-full-stack-hacking-4m5k</guid>
      <description>&lt;h2&gt;
  
  
  Security Is More Than Code
&lt;/h2&gt;

&lt;p&gt;Security and hacking are like mixed martial arts. They demand information, human, and physical skills all at once. But roughly 80% of security books focus only on the information layer, leaving human and physical security with about 10% each.&lt;/p&gt;

&lt;p&gt;This blind spot matters. Physical access can neutralize most digital defenses instantly, and most incidents trace back to human factors: misconfigurations, lost devices, phishing.&lt;/p&gt;

&lt;p&gt;I've spent years researching all three domains as one. The result is my book: &lt;em&gt;Cyber Ninja: A Beginner's Guide — The World of Full-Stack Hacking&lt;/em&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  So Why "Ninja"?
&lt;/h2&gt;

&lt;p&gt;Ninja infiltrated enemy territory to secretly gather intelligence. Hackers exploit system vulnerabilities to penetrate networks and exfiltrate data. Both erase their traces. The parallel runs deep.&lt;/p&gt;

&lt;p&gt;But the connection goes beyond metaphor. In 2021, Ben McCarty of the NSA published &lt;em&gt;Cyberjutsu&lt;/em&gt; (No Starch Press) and showed that 400-year-old ninja manuals hold practical insights for modern security training. When that book got translated into Japanese, it hit me hard: an American author had connected Japanese ninja culture with cybersecurity in a way no Japanese expert had done. That shock pushed me to write my own book — not to repeat the same idea, but to propose something new: the concept of a &lt;strong&gt;Cyber Ninja&lt;/strong&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Is a Cyber Ninja?
&lt;/h2&gt;

&lt;blockquote&gt;
&lt;p&gt;A Cyber Ninja is a new generation of hacker who adapts the spirit and tactics of traditional ninja to modern technology, carrying out covert operations and defensive missions in today's information society.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Think of it as ninja + hacker at the core, borrowing what's useful from spies and the military. The concept is new, but as security challenges keep crossing old boundaries, I believe it will take root.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjl3u04npu5z6r9yc5wt7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjl3u04npu5z6r9yc5wt7.png" alt=" " width="800" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key traits:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Gain advantage through intelligence gathering and analysis&lt;/li&gt;
&lt;li&gt;Cross the boundaries of information, physical, and human domains&lt;/li&gt;
&lt;li&gt;Switch between analog and digital as the situation demands&lt;/li&gt;
&lt;li&gt;Overcome difficulties with ingenuity — if the tool doesn't exist, build it&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If a Cyber Ninja is the person, then &lt;strong&gt;Cyber Ninjutsu&lt;/strong&gt; is the body of techniques they use — distinct from McCarty's "Cyberjutsu." It covers not only established hacking techniques, but also new approaches that go beyond the current state of the art, primarily from the attacker's perspective.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Five Conditions of a Cyber Ninja
&lt;/h2&gt;

&lt;p&gt;What does it take to be a Cyber Ninja? I looked at what's expected of &lt;em&gt;jonin&lt;/em&gt; (elite ninja), experienced spies, and white-hat hackers, and distilled five conditions:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F69069txi3lc3eadjw6us.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F69069txi3lc3eadjw6us.png" alt=" " width="800" height="480"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Technical skill&lt;/strong&gt; — A trinity approach: information, physical, and human security. Plus solid computer fundamentals.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Ethics&lt;/strong&gt; — Never abuse offensive techniques. Contribute to society.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Legal knowledge&lt;/strong&gt; — Understand cybercrime laws and work within them.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Aptitude&lt;/strong&gt; — Curiosity, passion, creativity, insight, judgment, problem-solving ability, logical thinking, perseverance.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Survival skills&lt;/strong&gt; — Physical fitness, health management, and preparedness for real-world threats.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;#5 surprises people. But threats don't only exist online. Even the most skilled hacker can fall ill or face physical danger. Ninja and spies both prioritized physical conditioning alongside technical mastery — and so should we.&lt;/p&gt;

&lt;h2&gt;
  
  
  What's Inside the Book
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz3pzd0qpnwrwpkz14gep.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz3pzd0qpnwrwpkz14gep.png" alt=" " width="489" height="692"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftl9b3fx5jbydr0ntj87q.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftl9b3fx5jbydr0ntj87q.png" alt=" " width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Five chapters, learning from ninja, spies, the military, and hackers:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Prologue&lt;/strong&gt; — Ninja meets hacker. The definition of a Cyber Ninja.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Knowledge&lt;/strong&gt; — Ninja clans, spy tradecraft, hacker ideals.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Tools&lt;/strong&gt; — From ninja lock-bypass tools to hacking devices.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Arts&lt;/strong&gt; — Ninjutsu to Cyber Ninjutsu.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Present&lt;/strong&gt; — Generative AI, dumpster diving, hacking robots, air-gap attacks.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It reads like a catalog — built around excitement and an original perspective, not dry theory.&lt;/p&gt;

&lt;h2&gt;
  
  
  Bridging Two Worlds
&lt;/h2&gt;

&lt;p&gt;In Japan, the ninja fan base is enormous — almost nobody dislikes ninja. My goal: use that massive audience as a gateway into the hacker world. More people crossing over means more security talent, and that's good for everyone.&lt;/p&gt;

&lt;p&gt;What I present is just one school of Cyber Ninja. I call it &lt;strong&gt;Mijinko-ryu&lt;/strong&gt; — the School of the Water Flea.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why I'm Writing in English
&lt;/h2&gt;

&lt;p&gt;&lt;em&gt;Cyber Ninja: A Beginner's Guide&lt;/em&gt; is currently available only in Japanese. But after 25 years of writing about security in Japanese, I feel strongly that the Cyber Ninja concept deserves a global audience. So I'm sharing the ideas here on dev.to, piece by piece. If this resonates with you, follow along.&lt;/p&gt;

&lt;h2&gt;
  
  
  About Me
&lt;/h2&gt;

&lt;p&gt;I'm IPUSIRON, a security researcher and technical writer from Japan. 25 years in the field, 40+ published books on hacking, cryptography, and lock sport.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://akademeia.info/" rel="noopener noreferrer"&gt;akademeia.info&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://x.com/ipusiron" rel="noopener noreferrer"&gt;@ipusiron on X&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://ipusiron.github.io/book_Caesar_concise_en/" rel="noopener noreferrer"&gt;Free book: Caesar and Vigenere Cipher (English)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Full details: &lt;a href="https://www.amazon.co.jp/dp/B0FZP4NB1H/" rel="noopener noreferrer"&gt;&lt;em&gt;Cyber Ninja: A Beginner's Guide&lt;/em&gt;&lt;/a&gt; (Japanese, Shoeisha, Jan 2026).&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Next: the ninja's six everyday tools — and how they map to a modern pentester's EDC.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;What's the most "ninja-like" security technique you've encountered? Drop your story in the comments.&lt;/em&gt; &lt;/p&gt;

</description>
      <category>security</category>
      <category>cybersecurity</category>
      <category>beginners</category>
      <category>hacking</category>
    </item>
  </channel>
</rss>
