
Sign up to save your library
With an OverDrive account, you can save your favorite libraries for at-a-glance information about availability. Find out more about OverDrive accounts.
Find this title in Libby, the library reading app by OverDrive.

Search for a digital library with this title
Title found at these libraries:
Loading... |
This is not your regular hacking book. Hell, some might say it is not even a book. This tutorial is part of a training program for aspiring hackers that provides dedicated access to real machines with real flaws for 24 hours straight.Reading about hacking is fun, hacking real systems is a whole other level of awesomeness! This program is an opportunity to hone your skills on the training platform at www.hacklikeapornstar.com/training: no simulation, no regex based wargames, no far-fetched hacking-like tricks that only work in CTF games... You access real machines with real and common flaws. The kind of vulnerabilities you find in every corporate environment around the world. It's up to you to exploit them in a meaningful way without screwing up the system.This tutorial assists you step-by-step through the different hoops in place: application whitelisting, privilege escalation, pivoting, etc. I strongly encourage you to take on the training, struggle with the challenge on your own for a few minutes before reading the chapter describing the solution. Try your usual techniques, read about new ones, and have fun.If you are looking for a passive read about hacking, there are other interesting (and more comprehensive) books to try (preferably mine). This piece of work is about concrete action! This is, in my opinion, the best way to fully internalize the concepts and reflexes that make a great hacker.In case you are discovering the world of hacking/pentesting, I planted several links to resources explaining the different concepts we are dealing with.