Don't hope to get rid of books (Umberto Eco)
+371 27000041, +371 27000045
(on working days 9:00-17:00 latvian)
+371 27000041
+371 27000045

(on working days 10:00-17:00)

Hacking. Secrets of Mastery

14.99 €
11.99 €
In stock
Hacking. Secrets of Mastery
14.99 €
11.99 €
In basket
This collection of selected articles from Hacker magazine describes how to find vulnerabilities in MikroTik networking equipment and how to use this equipment for Windows post-exploitation. It shows how to protect MikroTik from hacker attacks. It tells about exploiting DOM XSS vulnerabilities with Web Messaging, about finding vulnerabilities in Android applications using Viber as an example and in the AdGuard driver for Windows. A detailed guide on NTLM Relay attacks and how to defend against them is provided. Instructions on fuzzing JS-applications using Fuzzilli are given, the error of use after free in Blink engine is described. Practical ways of implementing anti-debugging in Linux executables are described. It is shown how GRE-pivoting works over network hardware. A separate chapter is devoted to a practical way of GPS spoofing.
See also:

You might be interested:

Discount!
Переход в облако. Практическое руководство по организации облачных вычислений для ученых и IT-специалистов
Information technology
Moving to the Cloud: A Practical Guide to Cloud Computing for Scientists and IT Professionals
Anielle Juan, Montes Diego, Iglesias Javier Rodeiro
14.99 €
11.99 €
In basket
Discount!
Разработка требований  к программному обеспечению
Information technology
Development of software requirements
Wiggers Carl, Beatty Joy
29.99 €
23.99 €
In basket
Discount!
Начинаем программировать на Python
Information technology
Getting Started with Python Programming
Gaddis Tony
49.99 €
39.99 €
In basket
Discount!
Совершенный код. Практическое руководство по разработке программного обеспечения
Information technology
Code Complete: A Practical Guide to Software Development
McConnell Steve
49.99 €
39.99 €
In basket