How to Hack Like a Ghost takes you deep inside the mind of a hacker as you carry out a fictionalized attack against a tech company, teaching cutting-edge hacking techniques along the way.
Go deep into the mind of a master hacker as he breaks into a hostile, cloud-based security environment. Sparc Flow invites you to shadow him every step of the way, from recon to infiltration, as you hack a shady, data-driven political consulting firm. While the target is fictional, the corporation’s vulnerabilities are based on real-life weaknesses in today’s advanced cybersecurity defense systems. You’ll experience all the thrills, frustrations, dead-ends, and eureka moments of his mission first-hand, while picking up practical, cutting-edge techniques for penetrating cloud technologies.
There are no do-overs for hackers, so your training starts with basic OpSec procedures, using an ephemeral OS, Tor, bouncing servers, and detailed code to build an anonymous, replaceable hacking infrastructure guaranteed to avoid detection. From there, you’ll examine some effective recon techniques, develop tools from scratch, and deconstruct low-level features in common systems to gain access to the target. Spark Flow’s clever insights, witty reasoning, and stealth maneuvers teach you how to think on your toes and adapt his skills to your own hacking tasks.
You'll learn:
• How to set up and use an array of disposable machines that can renew in a matter of seconds to change your internet footprint
• How to do effective recon, like harvesting hidden domains and taking advantage of DevOps automation systems to trawl for credentials
• How to look inside and gain access to AWS’s storage systems
• How cloud security systems like Kubernetes work, and how to hack them
• Dynamic techniques for escalating privileges
Packed with interesting tricks, ingenious tips, and links to external resources, this fast-paced, hands-on guide to penetrating modern cloud systems will help hackers of all stripes succeed on their next adventure.
"synopsis" may belong to another edition of this title.
Sparc Flow is a computer security expert specializing in ethical hacking, who has presented his research at international security conferences like Black Hat, DEF CON, Hack In The Box, and more. While his day job consists mainly of performing penetration tests against companies so they can patch vulnerabilities, his passion is writing and sharing hacking knowledge through his acclaimed Hack the Planet books.
"About this title" may belong to another edition of this title.
Seller: World of Books (was SecondSale), Montgomery, IL, U.S.A.
Condition: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Seller Inventory # 00093043890
Seller: Aspen Book Co., Denver, CO, U.S.A.
Condition: good. A well-loved companion. Corners and cover might show a little wear, and you could find some notes or highlights. The dust jacket might be MIA, it might have been a library book and extras aren't guaranteedâ"but the story's all there! Seller Inventory # PKV.1718501269.G
Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condition: Very Good. No Jacket. Former library book; May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less. Seller Inventory # G1718501269I4N10
Seller: Goodwill of Greater Milwaukee and Chicago, Racine, WI, U.S.A.
Condition: good. Book is considered to be in good or better condition. The actual cover image may not match the stock photo. Hard cover books may show signs of wear on the spine, cover or dust jacket. Paperback book may show signs of wear on spine or cover as well as having a slight bend, curve or creasing to it. Book should have minimal to no writing inside and no highlighting. Pages should be free of tears or creasing. Stickers should not be present on cover or elsewhere, and any CD or DVD expected with the book is included. Book is not a former library copy. Seller Inventory # SEWV.1718501269.G
Seller: WorldofBooks, Goring-By-Sea, WS, United Kingdom
Paperback. Condition: Fine. Seller Inventory # GOR014582627
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 41605354-n
Seller: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condition: new. Paperback. How to Hack Like a Ghost takes readers deep inside the mind of a hacker as they carry out a fictionalized attack against a tech company, teaching cutting-edge hacking techniques along the way.How to Hack Like a Ghost takes you deep inside the mind of a hacker as you carry out a fictionalized attack against a tech company, teaching cutting-edge hacking techniques along the way.Go deep into the mind of a master hacker as he breaks into a hostile, cloud-based security environment. Sparc Flow invites you to shadow him every step of the way, from recon to infiltration, as you hack a shady, data-driven political consulting firm. While the target is fictional, the corporation's vulnerabilities are based on real-life weaknesses in today's advanced cybersecurity defense systems. You'll experience all the thrills, frustrations, dead-ends, and eureka moments of his mission first-hand, while picking up practical, cutting-edge techniques for penetrating cloud technologies.There are no do-overs for hackers, so your training starts with basic OpSec procedures, using an ephemeral OS, Tor, bouncing servers, and detailed code to build an anonymous, replaceable hacking infrastructure guaranteed to avoid detection. From there, you'll examine some effective recon techniques, develop tools from scratch, and deconstruct low-level features in common systems to gain access to the target. Spark Flow's clever insights, witty reasoning, and stealth maneuvers teach you how to think on your toes and adapt his skills to your own hacking tasks.You'll learn-How to set up and use an array of disposable machines that can renew in a matter of seconds to change your internet footprintHow to do effective recon, like harvesting hidden domains and taking advantage of DevOps automation systems to trawl for credentialsHow to look inside and gain access to AWS's storage systemsHow cloud security systems like Kubernetes work, and how to hack themDynamic techniques for escalating privilegesPacked with interesting tricks, ingenious tips, and links to external resources, this fast-paced, hands-on guide to penetrating modern cloud systems will help hackers of all stripes succeed on their next adventure. "This book is about hacking modern cloud technologies. The reader adopts the role of the hacker-narrator, whose target is a fictional political consultancy firm. The reader shadows the hacker through the journey from setting up a stealthy hacking system on their machine to infiltrating and exploiting the target"-- Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Seller Inventory # 9781718501263
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 41605354
Seller: INDOO, Avenel, NJ, U.S.A.
Condition: As New. Unread copy in mint condition. Seller Inventory # RH9781718501263
Seller: INDOO, Avenel, NJ, U.S.A.
Condition: New. Brand New. Seller Inventory # 9781718501263