![]() Besides, you will discover the geopolitics of the western world and the middle east that influenced the chain of events. For instance, you will learn the history of the Iranian program before it even started. Throughout the book, the author covers many facets of the story. Stuxnet was the malware that sabotaged the Iranian nuclear program for years without detection. In this book, the cybersecurity journalist Kim Zetter tells the story of the first digital weapon that sets the age of cyber warfare. ![]() If you enjoy reading novels and you want to step up your hacking game, this is a must read! How to Hack Like a Ghost: A detailed account of a breach to rememberĬountdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon Throughout the entire journey, you get to see exactly how the hack is planned and executed down to the technical details and the code snippets, without compromising the thrilling part of the story plot. From there, he abuses domain trusts to expand his presence, eventually taking full control of the entire company and exfiltrating sensitive data from the mainframe. ![]() Once he connects to it from the front gun server, he uses multiple techniques to escalate his privileges and take control of the domain hosting the store. This time, instead of breaching the DMZ remotely, the hacker implants a malicious raspberry pi into one of the stores. In fact, the narrator walks you through the journey of hacking a fictitious fashion company, from no access to full control. If you enjoyed reading the previous book, How to hack like a P***star, I bet you will have already read this one! If you didn’t, here is my experience with the book. How to hack like a God is a hacking book for red team operators and serious penetration testers You will also discover the different hacking tools that can be used for each phase of the engagement. Throughout this awesome hacking book, you will get to learn the thinking process of a determined hacker as he or she slowly, but surely, infiltrates a fictitious bank IT infrastructure. Only this time, I’m witnessing the hack in a very technical perspective. When I read this hacking book, I immediately remembered the Software story from the Art of Intrusion book I mentioned earlier. To add more value, it starts with the tactics you can perform to stay anonymous. In fact, it breaches the perimeter both using a phishing campaign and hacking the external servers. I liked the fact that it draws different scenarios for attacking a fictitious bank, which greatly increases its content value. This hacking book covers many hacking tactics used by cybercriminals, but also by advanced ethical hackers during an engagement, especially red team ones, which have wider scope and allow more freedom for ethical hackers to simulate advanced attacks. One of the best hacking books for Red Team operations
0 Comments
Leave a Reply. |