- Identify and evade Microsoft security systems like Advanced Threat Analysis,QRadar, MDE, and AMSI
- Seek out subdomains and open ports with Censys, Python scripts, and other OSINT tools
- Scrape password hashes using Kerberoasting
- Plant camouflaged C# backdoors and payloads
- Grab victims' credentials with more advanced techniques like reflection anddomain replication
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Security Tutorials
"Another great hacker plot by Spark Flow. This is the 7th book in his series on penetration testing, and like the rest it does not disappoint . . . Short, engaging, technical, and really fun."
LockBoxx: A Hacker's Blog
"A good addition to his series. It covers many more topics to the existing others. This book is available to everyone because all tools and techniques presented are open sources."
OnlineBooksReview
"What sets this book apart from other cyber security books is the unique plot it follows . . . The book is written for penetration testers and red teamers, but if you have some knowledge in IT do not hesitate to pick it up. It is a great read and Sparc Flow details step-by-step every line of code and obscure tip to make it understandable by everyone."
Tech Guide and Reviews
"A good introduction to the entire process of infiltrating and compromising a network from beginning to end, and the kind of logical and creative thinking needed to successfully compromise a well secured environment."
Darlene Hibbs, Senior Cybersecurity Researcher, Fortra