The collection of selected articles from the magazine "Hacker" describes methods for finding vulnerabilities in MikroTik network equipment and using this equipment for post-exploitation of Windows. It shows methods to protect MikroTik from hacker attacks. It discusses the exploitation of... DOM XSS vulnerabilities using Web Messaging, searching for vulnerabilities in Android applications using Viber as an example, and in the AdGuard driver for Windows. A detailed guide on NTLM Relay attacks and protection against them is provided. Instructions for fuzzing JS applications using Fuzzilli are given, and the use after free bug in the Blink engine is described. Practical ways of implementing anti-debugging in executable files for Linux are outlined. It shows how GRE pivoting works over network equipment. A separate chapter is dedicated to a practical method of GPS spoofing.For readers interested in information security
Printhouse: BHV
Age restrictions: 16+
Year of publication: 2024
ISBN: 9785977519182
Number of pages: 240
Size: 230х165х13 mm
Cover type: soft
Weight: 354 g
Delivery methods
Choose the appropriate delivery method
Pick up yourself from the shop
0.00 £
Courier delivery