The Hacker Playbook 2: Practical Guide To Penetration Testing. Peter Kim

This is the second iteration of Hacker Playbook (THP). For those who have read the first book, this<br>continuation of this book. The following is an overview of all the new vulnerabilities and attacks that discuss.

ПРИСОЕДИНЯЙТЕСЬ 358 Просмотры
Image

In addition to new content, attacks and tricks from the first book, which are still relevant to date, included to eliminate the need to refer to the first book. So what's new?

Some of the updated attacks over the past year and a half include:

  • Good idea.
  • contusion
  • Kerberos problems (Golden ticket / skeleton key)
  • PTH Postgres
  • New Spear Phishing
  • Better / Cheaper Dropbox
  • Faster / Smarter Password Hacking
  • NEW Wi FI attacks
  • Tons of PowerShell scripts
  • Privileges In The System
  • Mass network compromise
  • Moving towards smarter
  • Burp Modules
  • Printer Exploits
  • Backdoor Plant
  • Zap proxy
  • sticky keys
  • In NoSQL Injections
  • Commercial Tools (Cobalt Strike, Canvas, Core Impact)
  • Laboratory sections
  • And much more

 

Скачать книгу можно бесплатно по данной ссылке: Скачать


Ваша реакция?

0
LOL
1
LOVED
0
PURE
0
AW
0
FUNNY
0
BAD!
0
EEW
0
OMG!
0
ANGRY
0 Комментарии

  • The Hacker Playbook 2: Practical Guide To Penetration Testing. Peter Kim
  • Владимир Петров