The Hacker Playbook 2: Practical Guide To Penetration Testing. Peter Kim


ΠšΠ°Ρ‚Π΅Π³ΠΎΡ€ΠΈΡ: Hacking

ΠŸΠΎΠ΄Π΅Π»ΠΈΡ‚ΡŒΡΡ:
This is the second iteration of Hacker Playbook (THP). For those who have read the first book, thiscontinuation of this book. The following is an overview of all the new vulnerabilities and attacks thatdiscuss. In addition to new content, attacks and tricks from the first book, which are stillrelevant to date, included to eliminate the need to refer to the first book. So what's new?Some of the updated attacks over the past year and a half include:Good idea.contusionKerberos problems (Golden ticket / skeleton key)PTH PostgresNew Spear PhishingBetter / Cheaper DropboxFaster / Smarter Password HackingNEW Wi FI attacksTons of PowerShell scriptsPrivileges In The SystemMass network compromiseMoving towards smarterBurp ModulesPrinter ExploitsBackdoor PlantZap proxysticky keysIn NoSQL InjectionsCommercial Tools (Cobalt Strike, Canvas, Core Impact)Laboratory sectionsAnd much more
 Π‘ΠΊΠ°Ρ‡Π°Ρ‚ΡŒ



ΠšΠΎΠΌΠΌΠ΅Π½Ρ‚Π°Ρ€ΠΈΠΈ

    НичСго Π½Π΅ Π½Π°ΠΉΠ΄Π΅Π½ΠΎ.