How to Hack Like a Ghost

How to Hack Like a Ghost
Author :
Publisher : No Starch Press
Total Pages : 238
Release :
ISBN-10 : 9781718501270
ISBN-13 : 1718501277
Rating : 4/5 (70 Downloads)

Book Synopsis How to Hack Like a Ghost by : Sparc Flow

Download or read book How to Hack Like a Ghost written by Sparc Flow and published by No Starch Press. This book was released on 2021-05-11 with total page 238 pages. Available in PDF, EPUB and Kindle. Book excerpt: How to Hack Like a Ghost takes you deep inside the mind of a hacker as you carry out a fictionalized attack against a tech company, teaching cutting-edge hacking techniques along the way. Go deep into the mind of a master hacker as he breaks into a hostile, cloud-based security environment. Sparc Flow invites you to shadow him every step of the way, from recon to infiltration, as you hack a shady, data-driven political consulting firm. While the target is fictional, the corporation’s vulnerabilities are based on real-life weaknesses in today’s advanced cybersecurity defense systems. You’ll experience all the thrills, frustrations, dead-ends, and eureka moments of his mission first-hand, while picking up practical, cutting-edge techniques for penetrating cloud technologies. There are no do-overs for hackers, so your training starts with basic OpSec procedures, using an ephemeral OS, Tor, bouncing servers, and detailed code to build an anonymous, replaceable hacking infrastructure guaranteed to avoid detection. From there, you’ll examine some effective recon techniques, develop tools from scratch, and deconstruct low-level features in common systems to gain access to the target. Spark Flow’s clever insights, witty reasoning, and stealth maneuvers teach you how to think on your toes and adapt his skills to your own hacking tasks. You'll learn: How to set up and use an array of disposable machines that can renew in a matter of seconds to change your internet footprint How to do effective recon, like harvesting hidden domains and taking advantage of DevOps automation systems to trawl for credentials How to look inside and gain access to AWS’s storage systems How cloud security systems like Kubernetes work, and how to hack them Dynamic techniques for escalating privileges Packed with interesting tricks, ingenious tips, and links to external resources, this fast-paced, hands-on guide to penetrating modern cloud systems will help hackers of all stripes succeed on their next adventure.


How to Hack Like a Ghost Related Books

How to Hack Like a Ghost
Language: en
Pages: 238
Authors: Sparc Flow
Categories: Computers
Type: BOOK - Published: 2021-05-11 - Publisher: No Starch Press

DOWNLOAD EBOOK

How to Hack Like a Ghost takes you deep inside the mind of a hacker as you carry out a fictionalized attack against a tech company, teaching cutting-edge hackin
How to Hack Like a God: Master the Secrets of Hacking Through Real Life Scenarios
Language: en
Pages: 122
Authors: Sparc Flow
Categories: Computers
Type: BOOK - Published: 2017-04-17 - Publisher: Hack the Planet

DOWNLOAD EBOOK

Follow me on a step-by-step hacking journey where we pwn a high-profile fashion company. From zero initial access to remotely recording board meetings, we will
How to Hack Like a Legend
Language: en
Pages: 217
Authors: Sparc Flow
Categories: Computers
Type: BOOK - Published: 2022-10-25 - Publisher: No Starch Press

DOWNLOAD EBOOK

Tag along with a master hacker on a truly memorable attack. From reconnaissance to infiltration, you’ll experience their every thought, frustration, and strat
Ghost in the Wires
Language: en
Pages: 502
Authors: Kevin Mitnick
Categories: Computers
Type: BOOK - Published: 2011-08-15 - Publisher: Little, Brown

DOWNLOAD EBOOK

In this "intriguing, insightful and extremely educational" novel, the world's most famous hacker teaches you easy cloaking and counter-measures for citizens and
Practical Social Engineering
Language: en
Pages: 241
Authors: Joe Gray
Categories: Computers
Type: BOOK - Published: 2022-06-14 - Publisher: No Starch Press

DOWNLOAD EBOOK

A guide to hacking the human element. Even the most advanced security teams can do little to defend against an employee clicking a malicious link, opening an em