|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_on1342787192 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
220830s2022 caua ob 001 0 eng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d OCLCF
|d YDX
|d OCLCQ
|d FTB
|
020 |
|
|
|a 9781718501515
|q electronic book
|
020 |
|
|
|a 171850151X
|q electronic book
|
020 |
|
|
|z 9781718501508
|
020 |
|
|
|z 1718501501
|
029 |
1 |
|
|a AU@
|b 000072506374
|
035 |
|
|
|a (OCoLC)1342787192
|
037 |
|
|
|a 9781098141431
|b O'Reilly Media
|
050 |
|
4 |
|a TK5105.59
|b .F626 2022
|
050 |
|
4 |
|a TK5105.59
|b .F56 2022
|
082 |
0 |
4 |
|a 005.8/7
|2 23
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Flow, Sparc,
|e author.
|
245 |
1 |
0 |
|a How to hack like a legend :
|b breaking windows /
|c by Sparc Flow.
|
264 |
|
1 |
|a San Francisco, CA :
|b No Starch Press, Inc.,
|c [2022]
|
300 |
|
|
|a 1 online resource :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a Step into the shoes of a master hacker and break into an intelligent, highly defensive Windows environment. You'll be infiltrating the suspicious (fictional) offshoring company G & S Trust and their hostile Microsoft stronghold. While the target is fictional, the corporation's vulnerabilities are based on real life weaknesses in today's advanced Windows defense systems. You'll experience all the thrills, frustrations, dead-ends, and eureka moments of the mission first-hand, while picking up practical, cutting-edge techniques for evading Microsoft's best security systems. The adventure starts with setting up your elite hacking infrastructure complete with virtual Windows system. After some thorough passive recon, you'll craft a sophisticated phishing campaign to steal credentials and gain initial access. Once inside you'll identify the security systems, scrape passwords, plant persistent backdoors, and delve deep into areas you don't belong. Throughout your task you'll get caught, change tack on a tee, dance around defensive monitoring systems, and disable tools from the inside. Sparc Flow's clever insights, witty reasoning, and stealth maneuvers teach you to be patient, persevere, and adapt your skills at the drop of a hat. You'll learn how to: •Identify and evade Microsoft security systems like Advanced Threat Analysis, QRadar, MDE, and AMSI •Seek out subdomains and open ports with Censys, Python scripts, and other OSINT tools •Scrape password hashes using Kerberoasting •Plant camouflaged C# backdoors and payloads •Grab victims' credentials with more advanced techniques like reflection and domain replication Like other titles in the How to Hack series, this book is packed with interesting tricks, ingenious tips, and links to useful resources to give you a fast-paced, hands-on guide to penetrating and bypassing Microsoft security systems.
|
588 |
|
|
|a Description based on online resource; title from digital title page (viewed on June 05, 2023).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Hacking.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Hacking.
|2 fast
|0 (OCoLC)fst01909643
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|0 (OCoLC)fst01789566
|
776 |
0 |
8 |
|i Print version:
|a Flow, Sparc.
|t How to hack like a legend.
|d San Francisco : No Starch Press, 2022
|z 9781718501508
|w (OCoLC)1338676084
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781098141431/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|