How to Hack Like a Legend

Hacking the Planet, #7

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book How to Hack Like a Legend by sparc Flow, sparc Flow
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: sparc Flow ISBN: 9781980792604
Publisher: sparc Flow Publication: April 7, 2018
Imprint: Language: English
Author: sparc Flow
ISBN: 9781980792604
Publisher: sparc Flow
Publication: April 7, 2018
Imprint:
Language: English

This is the story of one hacker who met his match in the form of machine learning, behavioral analysis, artificial intelligence, and a dedicated SOC team while breaking into an offshore service provider.
Most hacking tools simply crash and burn in such a hostile environment.

What is a hacker to do when facing such a fully equipped opponent? 

In this new edition, we cover step-by-step tricks and techniques to circumvent next-generation security vendors that gracefully sponsor the many big shot hacking conferences, including Unmanaged PowerShell, C# Reflection, DKIM signatures, Kerberoasting, terminating protected processes and many more essential tips for hacking and red team assignments alike.
Better buckle up, this is going to be one hell of a ride!

This book's edition assumes prior knowledge of basic Windows principles such as NTLM, pass-the-hash, Windows Active Directory, group policy objects and so forth. If you are scantly comfortable with these concepts, I strongly encourage you to first read How to Hack Like a Pornstar or How to Hack Like a God before taking on this book.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This is the story of one hacker who met his match in the form of machine learning, behavioral analysis, artificial intelligence, and a dedicated SOC team while breaking into an offshore service provider.
Most hacking tools simply crash and burn in such a hostile environment.

What is a hacker to do when facing such a fully equipped opponent? 

In this new edition, we cover step-by-step tricks and techniques to circumvent next-generation security vendors that gracefully sponsor the many big shot hacking conferences, including Unmanaged PowerShell, C# Reflection, DKIM signatures, Kerberoasting, terminating protected processes and many more essential tips for hacking and red team assignments alike.
Better buckle up, this is going to be one hell of a ride!

This book's edition assumes prior knowledge of basic Windows principles such as NTLM, pass-the-hash, Windows Active Directory, group policy objects and so forth. If you are scantly comfortable with these concepts, I strongly encourage you to first read How to Hack Like a Pornstar or How to Hack Like a God before taking on this book.

More books from Application Software

Cover of the book Image Blending Techniques and their Application in Underwater Mosaicing by sparc Flow
Cover of the book Auswahl von Enterprise-VoIP-Systemen by sparc Flow
Cover of the book Practical Reverse Engineering by sparc Flow
Cover of the book Mastering Autodesk Maya 2012 by sparc Flow
Cover of the book Comment reussir la mise en forme de vos livres numeriques - De Word vers le MOBI (Kindle) et l'EPUB by sparc Flow
Cover of the book Excel 2010 - Le guide complet by sparc Flow
Cover of the book Blind Image Deconvolution by sparc Flow
Cover of the book An Amazing Circus of Phonograms-Act 1 by sparc Flow
Cover of the book Struktur des Online Medienmarktes by sparc Flow
Cover of the book Emerging Trends in Applications and Infrastructures for Computational Biology, Bioinformatics, and Systems Biology by sparc Flow
Cover of the book Inventor 2014 and Inventor LT 2014 Essentials: Autodesk Official Press by sparc Flow
Cover of the book My GoPro Hero Camera by sparc Flow
Cover of the book Autopubblicatevi! - La guida definitiva per creare (da soli) e pubblicare (subito) il vostro primo libro/ebook (e anche quelli successivi) by sparc Flow
Cover of the book Blender Cycles: Lighting and Rendering Cookbook by sparc Flow
Cover of the book Kali Linux 2018: Windows Penetration Testing by sparc Flow
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy