How to Hack Like a God
(eBook)

Book Cover
Average Rating
Author
Status
Available Online

Description

Loading Description...

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

More Details

Published
sparc Flow, 2017.
Format
eBook
Language
English
ISBN
9781521232682

Reviews from GoodReads

Loading GoodReads Reviews.

Citations

APA Citation, 7th Edition (style guide)

Sparc Flow., & Sparc Flow|AUTHOR. (2017). How to Hack Like a God . sparc Flow.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Sparc Flow and Sparc Flow|AUTHOR. 2017. How to Hack Like a God. sparc Flow.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Sparc Flow and Sparc Flow|AUTHOR. How to Hack Like a God sparc Flow, 2017.

MLA Citation, 9th Edition (style guide)

Sparc Flow, and Sparc Flow|AUTHOR. How to Hack Like a God sparc Flow, 2017.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Go To Grouped Work

Grouping Information

Grouped Work ID22acd41a-387a-8c7b-7ca0-7524ea1f7b7e-eng
Full titlehow to hack like a god
Authorflow sparc
Grouping Categorybook
Last Update2023-09-19 06:40:23AM
Last Indexed2024-04-27 02:41:01AM

Book Cover Information

Image Sourcehoopla
First LoadedJul 18, 2023
Last UsedAug 26, 2023

Hoopla Extract Information

stdClass Object
(
    [year] => 2017
    [artist] => Sparc Flow
    [fiction] => 
    [coverImageUrl] => https://cover.hoopladigital.com/dra_9781521232682_270.jpeg
    [titleId] => 14941629
    [isbn] => 9781521232682
    [abridged] => 
    [language] => ENGLISH
    [profanity] => 
    [title] => How to Hack Like a God
    [demo] => 
    [segments] => Array
        (
        )

    [pages] => 94
    [children] => 
    [artists] => Array
        (
            [0] => stdClass Object
                (
                    [name] => Sparc Flow
                    [artistFormal] => Flow, Sparc
                    [relationship] => AUTHOR
                )

        )

    [genres] => Array
        (
            [0] => Computers
            [1] => Hardware
            [2] => Mainframes & Minicomputers
            [3] => Security
            [4] => Viruses & Malware
        )

    [price] => 1.35
    [id] => 14941629
    [edited] => 
    [kind] => EBOOK
    [active] => 1
    [upc] => 
    [synopsis] => Ever wondered how hackers breach big corporations? Wonder no more. We detail a step-by-step real life scenario to hack a luxury brand, steal credit card data and spy on board members.

Art of exploitation. We start by building a small hardware backdoor that we plant in a retail store owned by our target brand. You get to learn about the Wiegand protocol and how to bypass card readers found in all major shops and companies.

Network security. Using our backdoor as a pivot, we infiltrate the internal network and exploit NTLM vulnerabilities to connect to a random server. We bypass Applocker rules and elevate privileges to take control over the streaming screens in the shop. But, that's not enough for us now is it?

We map the company's network architecture and bounce from server to server using "Pass-the-ticket” techniques and domain trusts in a Windows Forest. We land on HQ networks at the other end of the globe.

Art of intrusion. Once inside the main network, we hack a couple of servers (Golden ticket, Token impersonation, etc.) and manage to break into an IBM Z Mainframe, where credit card data is stored. We exfiltrate data from the Mainframe, then smuggle them off the network without triggering the DLP software.

Finally, we explore how to execute code on the laptop of every board member and spy on their meetings.

No metasploit and other old hacking tricks. We go through each hacking trick step-by-step: from bypassing Citrix/Applocker to abusing Kerberos and hacking a Mainframe. The idea is to help you replicate these procedures during your engagements.

All custom attack payloads are provided and explained thoroughly in the book.
    [url] => https://www.hoopladigital.com/title/14941629
    [pa] => 
    [series] => Hacking the Planet
    [publisher] => sparc Flow
    [purchaseModel] => INSTANT
)