The Ultimate Guide to Windows and Linux Attack Techniques
Operating systems are the battlefield of modern cyber operations. Attackers don’t just exploit applications—they exploit the very foundations of Windows and Linux to escalate privileges, maintain persistence, and seize control.
The Offensive Playbook is your comprehensive guide to these techniques, blending theory, case studies, and hands-on labs.
Inside you’ll discover:
Windows attacks: Kerberoasting, Pass-the-Hash, Golden and Silver Tickets, DCSync, service misconfigurations, and Active Directory persistence.
Linux attacks: Exploiting cron jobs, SUID binaries, misconfigured NFS shares, privilege escalation, and persistence mechanisms.
Hands-on labs: Step-by-step exercises to safely simulate attacks in your own isolated environment.
Real-world case studies: How APTs and ransomware groups exploit OS-level weaknesses.
Future insights: AI-driven exploitation, quantum threats to authentication, and autonomous attack/defense systems.
This book is designed for:
Penetration testers and red teamers who want to sharpen their OS exploitation skills.
Blue team defenders who need to anticipate and detect Windows and Linux attack chains.
Students and learners seeking a practical, lab-driven introduction to offensive operating system security.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Vendeur : Grand Eagle Retail, Bensenville, IL, Etats-Unis
Paperback. Etat : new. Paperback. The Ultimate Guide to Windows and Linux Attack TechniquesOperating systems are the battlefield of modern cyber operations. Attackers don't just exploit applications-they exploit the very foundations of Windows and Linux to escalate privileges, maintain persistence, and seize control.The Offensive Playbook is your comprehensive guide to these techniques, blending theory, case studies, and hands-on labs.Inside you'll discover: Windows attacks: Kerberoasting, Pass-the-Hash, Golden and Silver Tickets, DCSync, service misconfigurations, and Active Directory persistence.Linux attacks: Exploiting cron jobs, SUID binaries, misconfigured NFS shares, privilege escalation, and persistence mechanisms.Hands-on labs: Step-by-step exercises to safely simulate attacks in your own isolated environment.Real-world case studies: How APTs and ransomware groups exploit OS-level weaknesses.Future insights: AI-driven exploitation, quantum threats to authentication, and autonomous attack/defense systems.This book is designed for: Penetration testers and red teamers who want to sharpen their OS exploitation skills.Blue team defenders who need to anticipate and detect Windows and Linux attack chains.Students and learners seeking a practical, lab-driven introduction to offensive operating system security. This item is printed on demand. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. N° de réf. du vendeur 9798268675344
Quantité disponible : 1 disponible(s)
Vendeur : California Books, Miami, FL, Etats-Unis
Etat : New. Print on Demand. N° de réf. du vendeur I-9798268675344
Quantité disponible : Plus de 20 disponibles
Vendeur : PBShop.store US, Wood Dale, IL, Etats-Unis
PAP. Etat : New. New Book. Shipped from UK. Established seller since 2000. N° de réf. du vendeur L2-9798268675344
Quantité disponible : Plus de 20 disponibles
Vendeur : PBShop.store UK, Fairford, GLOS, Royaume-Uni
PAP. Etat : New. New Book. Shipped from UK. Established seller since 2000. N° de réf. du vendeur L2-9798268675344
Quantité disponible : Plus de 20 disponibles
Vendeur : CitiRetail, Stevenage, Royaume-Uni
Paperback. Etat : new. Paperback. The Ultimate Guide to Windows and Linux Attack TechniquesOperating systems are the battlefield of modern cyber operations. Attackers don't just exploit applications-they exploit the very foundations of Windows and Linux to escalate privileges, maintain persistence, and seize control.The Offensive Playbook is your comprehensive guide to these techniques, blending theory, case studies, and hands-on labs.Inside you'll discover: Windows attacks: Kerberoasting, Pass-the-Hash, Golden and Silver Tickets, DCSync, service misconfigurations, and Active Directory persistence.Linux attacks: Exploiting cron jobs, SUID binaries, misconfigured NFS shares, privilege escalation, and persistence mechanisms.Hands-on labs: Step-by-step exercises to safely simulate attacks in your own isolated environment.Real-world case studies: How APTs and ransomware groups exploit OS-level weaknesses.Future insights: AI-driven exploitation, quantum threats to authentication, and autonomous attack/defense systems.This book is designed for: Penetration testers and red teamers who want to sharpen their OS exploitation skills.Blue team defenders who need to anticipate and detect Windows and Linux attack chains.Students and learners seeking a practical, lab-driven introduction to offensive operating system security. This item is printed on demand. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability. N° de réf. du vendeur 9798268675344
Quantité disponible : 1 disponible(s)