Ultimate Hacking Challenge

This is not your regular hacking book. Hell, some might say it is not even a book. This tutorial is part of a training program for aspiring hackers that provides dedicated access to real machines with real flaws for 24 hours straight.

Reading about hacking is fun, hacking real systems is a whole other level of awesomeness! This program is an opportunity to hone your skills on the training platform at www.hacklikeapornstar.com/training: no simulation, no regex based wargames, no far-fetched hacking-like tricks that only work in CTF games… You access real machines with real and common flaws. The kind of vulnerabilities you find in every corporate environment around the world. It’s up to you to exploit them in a meaningful way without screwing up the system.

This tutorial assists you step-by-step through the different hoops in place: application whitelisting, privilege escalation, pivoting, etc. I strongly encourage you to take on the training, struggle with the challenge on your own for a few minutes before reading the chapter describing the solution. Try your usual techniques, read about new ones, and have fun.

If you are looking for a passive read about hacking, there are other interesting (and more comprehensive) books to try (preferably mine). This piece of work is about concrete action! This is, in my opinion, the best way to fully internalize the concepts and reflexes that make a great hacker.
In case you are discovering the world of hacking/pentesting, I planted several links to resources explaining the different concepts we are dealing with.

1126525716
Ultimate Hacking Challenge

This is not your regular hacking book. Hell, some might say it is not even a book. This tutorial is part of a training program for aspiring hackers that provides dedicated access to real machines with real flaws for 24 hours straight.

Reading about hacking is fun, hacking real systems is a whole other level of awesomeness! This program is an opportunity to hone your skills on the training platform at www.hacklikeapornstar.com/training: no simulation, no regex based wargames, no far-fetched hacking-like tricks that only work in CTF games… You access real machines with real and common flaws. The kind of vulnerabilities you find in every corporate environment around the world. It’s up to you to exploit them in a meaningful way without screwing up the system.

This tutorial assists you step-by-step through the different hoops in place: application whitelisting, privilege escalation, pivoting, etc. I strongly encourage you to take on the training, struggle with the challenge on your own for a few minutes before reading the chapter describing the solution. Try your usual techniques, read about new ones, and have fun.

If you are looking for a passive read about hacking, there are other interesting (and more comprehensive) books to try (preferably mine). This piece of work is about concrete action! This is, in my opinion, the best way to fully internalize the concepts and reflexes that make a great hacker.
In case you are discovering the world of hacking/pentesting, I planted several links to resources explaining the different concepts we are dealing with.

9.99 In Stock
Ultimate Hacking Challenge

Ultimate Hacking Challenge

by Sparc Flow
Ultimate Hacking Challenge

Ultimate Hacking Challenge

by Sparc Flow

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers

LEND ME® See Details

Overview

This is not your regular hacking book. Hell, some might say it is not even a book. This tutorial is part of a training program for aspiring hackers that provides dedicated access to real machines with real flaws for 24 hours straight.

Reading about hacking is fun, hacking real systems is a whole other level of awesomeness! This program is an opportunity to hone your skills on the training platform at www.hacklikeapornstar.com/training: no simulation, no regex based wargames, no far-fetched hacking-like tricks that only work in CTF games… You access real machines with real and common flaws. The kind of vulnerabilities you find in every corporate environment around the world. It’s up to you to exploit them in a meaningful way without screwing up the system.

This tutorial assists you step-by-step through the different hoops in place: application whitelisting, privilege escalation, pivoting, etc. I strongly encourage you to take on the training, struggle with the challenge on your own for a few minutes before reading the chapter describing the solution. Try your usual techniques, read about new ones, and have fun.

If you are looking for a passive read about hacking, there are other interesting (and more comprehensive) books to try (preferably mine). This piece of work is about concrete action! This is, in my opinion, the best way to fully internalize the concepts and reflexes that make a great hacker.
In case you are discovering the world of hacking/pentesting, I planted several links to resources explaining the different concepts we are dealing with.


Product Details

BN ID: 2940154402412
Publisher: Sparc Flow
Publication date: 06/04/2017
Sold by: Smashwords
Format: eBook
File size: 1 MB

About the Author

Sparc Flow is a security researcher based in Europe. He works for different institutions (banks, airlines, insurers, etc.) as a chief penetration tester.
This entails looking for vulnerabilities, devloping malwares and exploiting flaws in a stealthy manner in order to find data that will make board members drop their jaws.
His first book "How to Hack Like a Pornstar" captures the essence of multiple situations he faced in real life and offers the reader a peak into the world of hacking and pentesting

From the B&N Reads Blog

Customer Reviews