Hacking. Secrets of skill
The collection of selected articles from the Hacker magazine describes ways to find vulnerabilities in the network equipment of Mikrotik and the use of this equipment for post -operation Windows. Mikrotik protection methods from hacker attacks are shown. It is described about the operation of the XSS-vain Dom XSS using Web Messaging, about the search for vulnerabilities in Android applications using the Viber example and in the ADGUARD driver for Windows. A detailed guide for NTLM RELAY attacks and protection against them is given.
Given the instructions for phasing JS applications using Fuzzilli, describes the USE AFTER FREE error in the BLINK engine. Practical methods for implementing anti -laying in executable files for Linux are set out. It is shown how the GRE-PICTISTING works on top of network equipment. A separate chapter is dedicated to the practical method of spaning GPS.
| Characteristics | |
| A country | Russia |
| Author | The team of authors |
| Number of pages | 272 |
| The year of publishing | 2024 |
| Type of cover | Soft binding |
There are no reviews for this product.