Niflheim World

Welcome to Niflheim !

  • Messages from new users will be checked for flood/spam before being posted on the forum. Users will also be checked for a multi-account.
    If you want to communicate without delay, get a free Huscarl status (how to get - User Groups), or buy premium status (how to buy - Premium status)
  • We help Ukrainian army to win the war against Russia. If you would like to join in helping, you can donate a small amount to one of the addresses below.
    BTC- bc1qmrnjt0eq5emtywxs0ujsusp59w4gkclfyqcjm2
    LTC - LbQfXfAxymMjwq6A4dQcowa9wswxZA6SBq
    ETH - 0x6F63FfAB23D1EF9aaf087f9107cEA88646A4A70e
    USDT (ERC20) - 0x6F63FfAB23D1EF9aaf087f9107cEA88646A4A70e
    USDT (TRC20) - TD33p7GjWjBfdRbmdNLNgUoYefsHSpAeoH

The Hacker Playbook 2: Practical Guide To Penetration Testing. Peter Kim


Redman

Forumteam
Staff member
Tignarman
Joined
Aug 24, 2020
Messages
15,723
Reaction score
21,599
NL COIN
79,313
1604843503051.png
This is the second iteration of Hacker Playbook (THP). For those who have read the first book, this
continuation of this book. The following is an overview of all the new vulnerabilities and attacks that
discuss. In addition to new content, attacks and tricks from the first book, which are still
relevant to date, included to eliminate the need to refer to the first book. So what's new?
Some of the updated attacks over the past year and a half include:
Good idea.
contusion
Kerberos problems (Golden ticket / skeleton key)
PTH Postgres
New Spear Phishing
Better / Cheaper Dropbox
Faster / Smarter Password Hacking
NEW Wi FI attacks
Tons of PowerShell scripts
Privileges In The System
Mass network compromise
Moving towards smarter
Burp Modules
Printer Exploits
Backdoor Plant
Zap proxy
sticky keys
In NoSQL Injections
Commercial Tools (Cobalt Strike, Canvas, Core Impact)
Laboratory sections
And much more

 
shape1
shape2
shape3
shape4
shape7
shape8
Top