How to Hack Like a GOD

Hacking the Planet, #2

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book How to Hack Like a GOD by sparc Flow, sparc Flow
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: sparc Flow ISBN: 9781521232682
Publisher: sparc Flow Publication: September 4, 2017
Imprint: Language: English
Author: sparc Flow
ISBN: 9781521232682
Publisher: sparc Flow
Publication: September 4, 2017
Imprint:
Language: English

Ever wondered how hackers breach big corporations? Wonder no more. We detail a step-by-step real life scenario to hack a luxury brand, steal credit card data and spy on board members.

Art of exploitation
We start by building a small hardware backdoor that we plant in a retail store owned by our target brand. You get to learn about the Wiegand protocol and how to bypass card readers found in all major shops and companies.

Network security
Using our backdoor as a pivot, we infiltrate the internal network and exploit NTLM vulnerabilities to connect to a random server. We bypass Applocker rules and elevate privileges to take control over the streaming screens in the shop. But, that's not enough for us now is it?

We map the company's network architecture and bounce from server to server using **"Pass-the-ticket"**techniques and domain trusts in a Windows Forest. We land on HQ networks at the other end of the globe.

Art of intrusion
Once inside the main network, we hack a couple of servers (Golden ticket, Token impersonation, etc.) and manage to break into an IBM Z Mainframe, where credit card data is stored. We exfiltrate data from the Mainframe, then smuggle them off the network without triggering the DLP software.

Finally, we explore how to execute code on the laptop of every board member and spy on their meetings.

No metasploit and other old hacking tricks
We go through each hacking trick step-by-step: from bypassing Citrix/Applocker to abusing Kerberos and hacking a Mainframe. The idea is to help you replicate these procedures during your engagements.

All custom attack payloads are provided and explained thoroughly in the book.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Ever wondered how hackers breach big corporations? Wonder no more. We detail a step-by-step real life scenario to hack a luxury brand, steal credit card data and spy on board members.

Art of exploitation
We start by building a small hardware backdoor that we plant in a retail store owned by our target brand. You get to learn about the Wiegand protocol and how to bypass card readers found in all major shops and companies.

Network security
Using our backdoor as a pivot, we infiltrate the internal network and exploit NTLM vulnerabilities to connect to a random server. We bypass Applocker rules and elevate privileges to take control over the streaming screens in the shop. But, that's not enough for us now is it?

We map the company's network architecture and bounce from server to server using **"Pass-the-ticket"**techniques and domain trusts in a Windows Forest. We land on HQ networks at the other end of the globe.

Art of intrusion
Once inside the main network, we hack a couple of servers (Golden ticket, Token impersonation, etc.) and manage to break into an IBM Z Mainframe, where credit card data is stored. We exfiltrate data from the Mainframe, then smuggle them off the network without triggering the DLP software.

Finally, we explore how to execute code on the laptop of every board member and spy on their meetings.

No metasploit and other old hacking tricks
We go through each hacking trick step-by-step: from bypassing Citrix/Applocker to abusing Kerberos and hacking a Mainframe. The idea is to help you replicate these procedures during your engagements.

All custom attack payloads are provided and explained thoroughly in the book.

More books from Application Software

Cover of the book Einstieg in WordPress by sparc Flow
Cover of the book Dependability in Electronic Systems by sparc Flow
Cover of the book Zeitung und Internet: Internetstrategien der Lokal- und Regionalpresse - medienökonomische und publizistische Ansätze mit Fallbeispielen by sparc Flow
Cover of the book Cyber Warfare by sparc Flow
Cover of the book Delivering IT and eBusiness Value by sparc Flow
Cover of the book Bayesian Networks in R by sparc Flow
Cover of the book Die Bedeutung von Facebook für den Onlinewerbemarkt: eine kritische Analyse aus Anbieter- und Nachfragersicht by sparc Flow
Cover of the book Mit Pod- und Vodcasts neue Wege in der Bildungswissenschaft beschreiten by sparc Flow
Cover of the book Value Creation from E-Business Models by sparc Flow
Cover of the book Project 2010 For Dummies by sparc Flow
Cover of the book Adobe Photoshop CS6 Digital Classroom by sparc Flow
Cover of the book Modern Leatherwork for Makers by sparc Flow
Cover of the book Online Security: Password Keys by sparc Flow
Cover of the book Take Control of Automating Your Mac by sparc Flow
Cover of the book Omnidirectional Vision Systems by sparc Flow
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy