How to Hack Like a Legend
(eBook)
Description
Loading Description...
More Details
Language
English
Citations
APA Citation, 7th Edition (style guide)
Sparc Flow., & Sparc Flow|AUTHOR. (2018). How to Hack Like a Legend . sparc Flow.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)Sparc Flow and Sparc Flow|AUTHOR. 2018. How to Hack Like a Legend. sparc Flow.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Sparc Flow and Sparc Flow|AUTHOR. How to Hack Like a Legend sparc Flow, 2018.
MLA Citation, 9th Edition (style guide)Sparc Flow, and Sparc Flow|AUTHOR. How to Hack Like a Legend sparc Flow, 2018.
Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.
Staff View
Grouping Information
Grouped Work ID | 166bca15-89ea-0b00-0510-2376a86bfe3c-eng |
---|---|
Full title | how to hack like a legend |
Author | flow sparc |
Grouping Category | book |
Last Update | 2024-05-15 02:00:44AM |
Last Indexed | 2024-06-29 02:27:17AM |
Book Cover Information
Image Source | hoopla |
---|---|
First Loaded | Jun 29, 2024 |
Last Used | Jun 29, 2024 |
Hoopla Extract Information
stdClass Object ( [year] => 2018 [artist] => Sparc Flow [fiction] => [coverImageUrl] => https://cover.hoopladigital.com/dra_9781980792604_270.jpeg [titleId] => 14936182 [isbn] => 9781980792604 [abridged] => [language] => ENGLISH [profanity] => [title] => How to Hack Like a Legend [demo] => [segments] => Array ( ) [pages] => 160 [children] => [artists] => Array ( [0] => stdClass Object ( [name] => Sparc Flow [artistFormal] => Flow, Sparc [relationship] => AUTHOR ) ) [genres] => Array ( [0] => Computers [1] => Network Security [2] => Security [3] => Viruses & Malware ) [price] => 1.35 [id] => 14936182 [edited] => [kind] => EBOOK [active] => 1 [upc] => [synopsis] => This is the story of one hacker who met his match in the form of machine learning, behavioral analysis, artificial intelligence, and a dedicated SOC team while breaking into an offshore service provider. Most hacking tools simply crash and burn in such a hostile environment. What is a hacker to do when facing such a fully equipped opponent? In this new edition, we cover step-by-step tricks and techniques to circumvent next-generation security vendors that gracefully sponsor the many big shot hacking conferences, including Unmanaged PowerShell, C# Reflection, DKIM signatures, Kerberoasting, terminating protected processes and many more essential tips for hacking and red team assignments alike. Better buckle up, this is going to be one hell of a ride! This book's edition assumes prior knowledge of basic Windows principles such as NTLM, pass-the-hash, Windows Active Directory, group policy objects and so forth. If you are scantly comfortable with these concepts, I strongly encourage you to first read How to Hack Like a Pornstar or How to Hack Like a God before taking on this book. [url] => https://www.hoopladigital.com/title/14936182 [pa] => [series] => Hacking the Planet [publisher] => sparc Flow [purchaseModel] => INSTANT )