January 2020
Intermediate to advanced
368 pages
9h 46m
English
Chapter 2: TCP, Scanners, and Proxies
Chapter 3: HTTP Clients and Remote Interaction with Tools
Chapter 4: HTTP Servers, Routing, and Middleware
Chapter 6: Interacting with SMB and NTLM
Chapter 7: Abusing Databases and Filesystems
Chapter 8: Raw Packet Processing
Chapter 9: Writing and Porting Exploit Code
Chapter 10: Go Plugins and Extendable Tools
Chapter 11: Implementing and Attacking Cryptography
Chapter 12: Windows System Interaction and Analysis
Chapter 13: Hiding Data with Steganography