December 2020
Intermediate to advanced
304 pages
8h 57m
English
Now that you’ve identified your target network’s attack surface, it’s time to begin compromising vulnerable hosts. This part of the book starts with chapter 5, which walks you through various methods of compromising vulnerable web applications such as Jenkins and Apache Tomcat. You’ll learn how to deploy custom-built backdoor web shells and upgrade them to fully interactive reverse command shell access to compromised targets.
Chapter 6 introduces you to the process of attacking an unsecured database server. In this chapter, you’ll also learn about Windows account password hashes, why they are useful to you as an attacker, and how to obtain them from a compromised system. Finally, this chapter covers some interesting ...