This is not a book about information security. Certainly not about IT. This is a book about hacking: specifically, how to infiltrate a company’s network, locate their most critical data, and make off with it without triggering whatever shiny new security tool the company wasted their budget on. Whether you are a wannabe ethical hacker or an experienced pentester frustrated by outdated books and false media reports, this book is definitely for you. We will set up a fake – but realistic enough – target and go in detail over the main steps to pwn the company: building phishing malware, finding vulnerabilities, rooting Windows domains, pwning a mainframe, etc.