Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

How to Hack Like a GOD: Hacking the Planet, #2
Ultimate Hacking Challenge: Hacking the Planet, #3
How to Hack Like a Pornstar: Hacking the Planet, #1
Ebook series6 titles

Hacking the Planet Series

Rating: 5 out of 5 stars

5/5

()

About this series

"There are two kinds of companies: those that have been breached and those that do not know it yet."


The company calling us just discovered an anomaly on their most critical systems. Our job is to conduct a deep forensic analysis, perform threat assessment, and uncover all malware programs left by hackers.

Digital Forensics
We follow the attacker's footprint across a variety of systems and create an infection timeline to help us understand their motives. We go as deep as memory analysis, perfect disk copy, threat hunting and malware analysis while sharing insights into real crisis management.

Rebuilding systems
Finally, we tackle the most important issues of any security incident response: how to kick the attackers out of the systems and regain trust in machines that have been breached.

For those that read hacking books like the "Art of Exploitation" or "How to Hack Like a Pornstar", you finally get to experience what it feels like to be on the other side of the Firewall!

LanguageEnglish
Publishersparc Flow
Release dateMay 13, 1994
How to Hack Like a GOD: Hacking the Planet, #2
Ultimate Hacking Challenge: Hacking the Planet, #3
How to Hack Like a Pornstar: Hacking the Planet, #1

Titles in the series (6)

  • How to Hack Like a Pornstar: Hacking the Planet, #1

    1

    How to Hack Like a Pornstar: Hacking the Planet, #1
    How to Hack Like a Pornstar: Hacking the Planet, #1

    This is not a book about information security. Certainly not about IT. This is a book about hacking: specifically, how to infiltrate a company's network, locate their most critical data, and make off with it without triggering whatever shiny new security tool the company wasted their budget on. Whether you are a wannabe ethical hacker or an experienced pentester frustrated by outdated books and false media reports, this book is definitely for you. We will set up a fake – but realistic enough – target and go in detail over the main steps to pwn the company: building phishing malware, finding vulnerabilities, rooting Windows domains, pwning a mainframe, etc.

  • How to Hack Like a GOD: Hacking the Planet, #2

    2

    How to Hack Like a GOD: Hacking the Planet, #2
    How to Hack Like a GOD: Hacking the Planet, #2

    Ever wondered how hackers breach big corporations? Wonder no more. We detail a step-by-step real life scenario to hack a luxury brand, steal credit card data and spy on board members. Art of exploitation We start by building a small hardware backdoor that we plant in a retail store owned by our target brand. You get to learn about the Wiegand protocol and how to bypass card readers found in all major shops and companies. Network security Using our backdoor as a pivot, we infiltrate the internal network and exploit NTLM vulnerabilities to connect to a random server. We bypass Applocker rules and elevate privileges to take control over the streaming screens in the shop. But, that's not enough for us now is it? We map the company's network architecture and bounce from server to server using "Pass-the-ticket"techniques and domain trusts in a Windows Forest. We land on HQ networks at the other end of the globe. Art of intrusion Once inside the main network, we hack a couple of servers (Golden ticket, Token impersonation, etc.) and manage to break into an IBM Z Mainframe, where credit card data is stored. We exfiltrate data from the Mainframe, then smuggle them off the network without triggering the DLP software. Finally, we explore how to execute code on the laptop of every board member and spy on their meetings. No metasploit and other old hacking tricks We go through each hacking trick step-by-step: from bypassing Citrix/Applocker to abusing Kerberos and hacking a Mainframe. The idea is to help you replicate these procedures during your engagements. All custom attack payloads are provided and explained thoroughly in the book.

  • Ultimate Hacking Challenge: Hacking the Planet, #3

    3

    Ultimate Hacking Challenge: Hacking the Planet, #3
    Ultimate Hacking Challenge: Hacking the Planet, #3

    This is not your regular hacking book. Hell, some might say it is not even a book. This is a training program that gives you a free coupon to access dedicated and real machines with real flaws for 24 hours straight. Reading about hacking is fun, hacking real systems is a whole other level of awesomeness! This program is an opportunity to hone your skills on the training platform at www.hacklikeapornstar.com/training: no simulation, no regex based wargames, no far-fetched hacking-like tricks that only work in CTF games… You get a free coupon to access real machines with real and common flaws. The kind of vulnerabilities you find in every corporate environment around the world: •Bypassing application whitelisting •Privilege escalation •Pivoting on other machines It’s up to you to exploit them in a meaningful way without screwing up the system. I strongly encourage you to take on the training, struggle with the challenge on your own for a few minutes before reading the chapter describing the solution. Try your usual techniques, read about new ones, and have fun. If you are looking for a passive read about hacking, there are other interesting (and more comprehensive) books to try (preferably mine). This piece of work is about concrete action! This is, in my opinion, the best way to fully internalize the concepts and reflexes that make a great hacker. In case you are discovering the world of hacking/pentesting, I planted several links to resources explaining the different concepts we are dealing with.

  • Ultimate Guide for Being Anonymous: Hacking the Planet, #4

    4

    Ultimate Guide for Being Anonymous: Hacking the Planet, #4
    Ultimate Guide for Being Anonymous: Hacking the Planet, #4

    If there is a section that most hacking books and blog posts currently disregard, it is the 'stay safe' section. In other words, they fail to detail the schemes and techniques a typical hacker (or activist) should use to guarantee a certain level of anonymity and safety. You may be the best hacker in the world, but if you cannot control your footprint on the internet and correctly erase your trail, you will simply crash and burn. There are many books on how to be anonymous online with tips that may work to some extent: disabling JavaScript, installing the Ghostery extension, using TOR, etc. These techniques may be effective against Facebook tracking and Google ads, but will do you no good against an active investigator tracking you down following a nasty hack, or a state sponsored surveillance program targeting activists. There is a mindset to have as well as a series of practical precautions to take when you want to completely disappear off the grid.  Together, we will set up an anonymous environment that guarantees maximum protection and shields your identity against prying eyes. Of course, there is no such thing as a zero-risk job, but we will try to get as close as possible.

  • How to Hack Like a Legend: Hacking the Planet, #7

    7

    How to Hack Like a Legend: Hacking the Planet, #7
    How to Hack Like a Legend: Hacking the Planet, #7

    This is the story of one hacker who met his match in the form of machine learning, behavioral analysis, artificial intelligence, and a dedicated SOC team while breaking into an offshore service provider. Most hacking tools simply crash and burn in such a hostile environment. What is a hacker to do when facing such a fully equipped opponent?  In this new edition, we cover step-by-step tricks and techniques to circumvent next-generation security vendors that gracefully sponsor the many big shot hacking conferences, including Unmanaged PowerShell, C# Reflection, DKIM signatures, Kerberoasting, terminating protected processes and many more essential tips for hacking and red team assignments alike. Better buckle up, this is going to be one hell of a ride! This book's edition assumes prior knowledge of basic Windows principles such as NTLM, pass-the-hash, Windows Active Directory, group policy objects and so forth. If you are scantly comfortable with these concepts, I strongly encourage you to first read How to Hack Like a Pornstar or How to Hack Like a God before taking on this book.

  • How to Investigate Like a Rockstar: Hacking the Planet

    How to Investigate Like a Rockstar: Hacking the Planet
    How to Investigate Like a Rockstar: Hacking the Planet

    "There are two kinds of companies: those that have been breached and those that do not know it yet." The company calling us just discovered an anomaly on their most critical systems. Our job is to conduct a deep forensic analysis, perform threat assessment, and uncover all malware programs left by hackers. Digital Forensics We follow the attacker's footprint across a variety of systems and create an infection timeline to help us understand their motives. We go as deep as memory analysis, perfect disk copy, threat hunting and malware analysis while sharing insights into real crisis management. Rebuilding systems Finally, we tackle the most important issues of any security incident response: how to kick the attackers out of the systems and regain trust in machines that have been breached. For those that read hacking books like the "Art of Exploitation" or "How to Hack Like a Pornstar", you finally get to experience what it feels like to be on the other side of the Firewall!

Related to Hacking the Planet

Related ebooks

Security For You

View More

Related articles

Related categories

Reviews for Hacking the Planet

Rating: 5 out of 5 stars
5/5

1 rating0 reviews

What did you think?

Tap to rate

Review must be at least 10 words