Step into the shoes of a master hacker as he breaks into an intelligent, highly defensive Windows environment. You'll be infiltrating the suspicious (fictional) offshoring company G & S Trust and their hostile Microsoft stronghold. While the target is fictional, the corporation's vulnerabilities are based on real-life weaknesses in today's advanced Windows defense systems. You'll experience all the thrills, frustrations, dead-ends, and eureka moments of the mission first-hand, while picking up practical, cutting-edge techniques for evading Microsoft's best security systems. The adventure starts with setting up your elite hacking infrastructure complete with a virtual Windows system to test your attacks on. After some thorough passive recon, you'll craft a sophisticated targeted phishing campaign to steal credentials and gain initial access. Once inside you'll investigate the security systems, scrape passwords, plant persistent backdoors, and delve deep into areas you don't belong. Throughout your task you'll get caught, change tack on a tee, dance around defensive monitoring systems, and disable security tools from the inside. Sparc Flow's clever insights, witty reasoning, and stealth maneuvers teach you to be patient, to persevere, and to adapt your skills at the drop of a hat. You'll learn how to: Harvest hidden domains and locate open ports with Censys, custom Python scripts, and other OSINT tools. Identify and evade Microsoft security systems like Advanced Threat Analysis, QRadar, Constrained Language mode, and AMSI. Launch a phishing campaign that eludes security filters by recycling domains, setting domain categories, and testing your email through SpamAssassin. Scrape passwords without triggering alarms with Mimikatz. Plant and persist your own custom C# backdoors, disguised as benign company code. Access private variables and emulate password request dialogues with advanced techniques like reflection and domain replication. Like other titles in the How to Hack series, this book is packed with interesting tricks, ingenious tips, and links to useful resources to give you a fast-paced, hands-on guide to penetrating and bypassing Microsoft security systems.
"synopsis" may belong to another edition of this title.
Sparc Flow is a computer security expert specialized in ethical hacking, who has presented research at international security conferences like Black Hat, DEF CON, and Hack In The Box. While his day job consists of performing penetration tests against companies so they can patch security vulnerabilities, his passion is writing and sharing hacking knowledge through his acclaimed Hack the Planet books.
"About this title" may belong to another edition of this title.
£ 2.98 shipping within U.S.A.
Destination, rates & speedsSeller: Seattle Goodwill, Seattle, WA, U.S.A.
paperback. Condition: Good. Seller Inventory # mon0000092851
Quantity: 1 available
Seller: Bookmans, Tucson, AZ, U.S.A.
paperback. Condition: Good. Satisfaction 100% guaranteed. Seller Inventory # mon0002652570
Quantity: 1 available
Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condition: Fair. No Jacket. Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend Less. Seller Inventory # G1718501501I5N00
Quantity: 1 available
Seller: HPB-Red, Dallas, TX, U.S.A.
paperback. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Seller Inventory # S_407173342
Quantity: 1 available
Seller: Bellwetherbooks, McKeesport, PA, U.S.A.
paperback. Condition: Fine. LIKE NEW!!! Has a red or black remainder mark on bottom/exterior edge of pages. Seller Inventory # NS-PB-LN-1718501501
Quantity: 8 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 42603565-n
Quantity: 15 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 42603565
Quantity: 15 available
Seller: INDOO, Avenel, NJ, U.S.A.
Condition: New. Seller Inventory # 9781718501508
Quantity: Over 20 available
Seller: INDOO, Avenel, NJ, U.S.A.
Condition: As New. Unread copy in mint condition. Seller Inventory # RH9781718501508
Quantity: Over 20 available
Seller: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condition: new. Paperback. Tag along with a master hacker on a truly memorable attack. From reconnaissance to infiltration, you'll experience their every thought, frustration, and strategic decision-making first-hand in this exhilarating narrative journey into a highly defended Windows environment driven by AI.Tag along with a master hacker on a truly memorable attack. From reconnaissance to infiltration, you'll experience their every thought, frustration, and strategic decision-making first-hand in this exhilarating narrative journey into a highly defended Windows environment driven by AI.Step into the shoes of a master hacker and break into an intelligent, highly defensive Windows environment. You'll be infiltrating the suspicious (fictional) offshoring company G & S Trust and their hostile Microsoft stronghold. While the target is fictional, the corporation's vulnerabilities are based on real-life weaknesses in today's advanced Windows defense systems. You'll experience all the thrills, frustrations, dead-ends, and eureka moments of the mission first-hand, while picking up practical, cutting-edge techniques for evading Microsoft's best security systems.The adventure starts with setting up your elite hacking infrastructure complete with virtual Windows system. After some thorough passive recon, you'll craft a sophisticated phishing campaign to steal credentials and gain initial access. Once inside you'll identify the security systems, scrape passwords, plant persistent backdoors, and delve deep into areas you don't belong. Throughout your task you'll get caught, change tack on a tee, dance around defensive monitoring systems, anddisable tools from the inside. Sparc Flow's clever insights, witty reasoning, andstealth maneuvers teach you to be patient, persevere, and adapt your skills at the drop of a hat.You'll learn how to-Identify and evade Microsoft security systems like Advanced Threat Analysis,QRadar, MDE, and AMSISeek out subdomains and open ports with Censys, Python scripts, and other OSINT toolsScrape password hashes using KerberoastingPlant camouflaged C# backdoors and payloadsGrab victims' credentials with more advanced techniques like reflection anddomain replicationLike other titles in the How to Hack series, this book is packed with interesting tricks, ingenious tips, and links to useful resources to give you a fast-paced, hands-on guide to penetrating and bypassing Microsoft security systems. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Seller Inventory # 9781718501508
Quantity: 1 available