Hack Like a Pornstar
Hack Like a Pornstar

Foreword

This is not a book about information security.
Certainly not about IT. This is a book about hacking:
specifically, how to infiltrate a company’s network,
locate their most critical data, and make off with it
without triggering whatever shiny new security tool the
company wasted their budget on.
Whether you are a wannabe ethical hacker or just an
enthusiast frustrated by outdated books and false media
reports, this book is definitely for you.
We will set up a fake – but realistic enough – target
and go in detail over the main steps to 0wn the company:
building phishing malware, finding vulnerabilities,
rooting Windows domains, p0wning mainframes, etc.
I have documented almost every tool and custom
script used in this book. I strongly encourage you to test
them and master their capabilities (and limitations) in an
environment you control and own. Given the nature of this
book, it is ludicrous to expect it to cover each and every
hacking technique imaginable, though I will try my best to
give as many examples as I can while staying true to the
stated purpose of the book.

I will do a flyover of some concepts like IPSEC,
TOR, and NTLM by briefly explaining how they work
and what they mean in the context of the hacking scenario.
If you feel like you want to go deeper, I strongly advise
you to follow the links I offer near each item and explore
the dark, fun concepts behind each technique and tool.

Click here to download This Ebook

1 COMMENT

LEAVE A REPLY

Please enter your comment!
Please enter your name here


CAPTCHA Image
Reload Image