This is not a book about information security. Certainly not about IT. This is a book about hacking: specifically, how to infiltrate a company’s network, locate their most critical data, and make off with it without triggering whatever shiny new security tool the company wasted their budget on.
Whether you are a wannabe ethical hacker or an experienced pentester frustrated by outdated books and false media reports, this book is definitely for you.
We will set up a fake – but realistic enough – target and go in detail over the main steps to hack the company: building phishing malware, finding vulnerabilities, rooting Windows domains, pwning a mainframe, etc.
Sparc Flow is a computer security expert. He specializes in ethical hacking and has presented his research at international security conferences like Black Hat, DEF CON, Hack In The Box,...
While his day job consists mainly of hacking companies and showing them how to fix their security vulnerabilities, his passion is writing and sharing the insight he gained in the security field
His first book "How to Hack Like a Pornstar" captures the essence of multiple situations he faced in real life and offers the reader a peak into the world of hacking and pentesting
Nice and short - from phishing emails to exfiltrating data, doing everything in a sexy way - meaning elegantly and quietly. If you’re a redteamer with like 3 years of experience there will be not too much new but it’s always nice to refresh your knowledge and learn some obscure tricks. Especially enjoyed the exfiltration part as well as Mainframe hacking.
Interesting, short, step-by-step introduction how hackers can penetrate organization network and what tools they may use. Good reading to remind you how hard it is to protect every corner of the network. In cyber attacker always has an advantage over defender.
If you read other books in the set you clearly see a patterns. did the author run out of creative ideas or did he just want to make money ?
The content is still really good but it wasn't as exciting as the other books in the same set. Not sure if the author did this intentionally to increase his passive income from these books. Still a brilliant idea regardless.
I would not call this a book. As a writeup - yeah, sure, not the worst out there... but not a book. Basically no "Why" and "How", just step by step list of actions he did to hack one specific scenario.
Not another metasploit tutorial, that's refreshing ! Very PowerShell oriented and uses up-to-date tools. I need to go through it once more to absorb it all, especially the chapter about stealing data from other computers..some heavy stuff.