How to Hack Like a Legend
Breaking Windows
Format:Paperback
Publisher:No Starch Press,US
Published:27th Oct '22
Should be back in stock very soon
Step into the shoes of a master hacker as he breaks into an intelligent, highly defensive Windows environment. You'll be infiltrating the suspicious (fictional) offshoring company G & S Trust and their hostile Microsoft stronghold. While the target is fictional, the corporation's vulnerabilities are based on real-life weaknesses in today s advanced Windows defense systems. You'll experience all the thrills, frustrations, dead-ends, and eureka moments of the mission first-hand, while picking up practical, cutting-edge techniques for evading Microsoft's best security systems.
"How To Hack Like a Legend is a well written, story lead, day in a life of a hacker taking you into his hacking mindset and showing the reader even failure can be turned into a successful hack. This sort of hands-on material is normally only ever gained through experiences in real life. Above all, being able to get all this information down on paper and wrapping it all up with a fictional story really shows Sparc knows what he’s talking about."
—Security Tutorials
"Another great hacker plot by Spark Flow. This is the 7th book in his series on penetration testing, and like the rest it does not disappoint . . . Short, engaging, technical, and really fun."
—LockBoxx: A Hacker's Blog
"A good addition to his series. It covers many more topics to the existing others. This book is available to everyone because all tools and techniques presented are open sources."
—OnlineBooksReview
"What sets this book apart from other cyber security books is the unique plot it follows . . . The book is written for penetration testers and red teamers, but if you have some knowledge in IT do not hesitate to pick it up. It is a great read and Sparc Flow details step-by-step every line of code and obscure tip to make it understandable by everyone."
—Tech Guide and Reviews
"A good introduction to the entire process of infiltrating and compromising a network from beginning to end, and the kind of logical and creative thinking needed to successfully compromise a well secured environment."
—Darlene Hibbs, Senior Cybersecurity Researcher, Fortra
ISBN: 9781718501508
Dimensions: unknown
Weight: unknown
216 pages