PoC or GTFO, Volume 3

PoC or GTFO, Volume 3

Author: Manul Laphroaig

Publisher: No Starch Press

Published: 2021-01-29

Total Pages: 804

ISBN-13: 1718500645

DOWNLOAD EBOOK

Volume 3 of the PoC || GTFO collection--read as Proof of Concept or Get the Fuck Out--continues the series of wildly popular collections of this hacker journal. Contributions range from humorous poems to deeply technical essays bound in the form of a bible. The International Journal of Proof-of-Concept or Get The Fuck Out is a celebrated collection of short essays on computer security, reverse engineering and retrocomputing topics by many of the world's most famous hackers. This third volume contains all articles from releases 14 to 18 in the form of an actual, bound bible. Topics include how to dump the ROM from one of the most secure Sega Genesis games ever created; how to create a PDF that is also a Git repository; how to extract the Game Boy Advance BIOS ROM; how to sniff Bluetooth Low Energy communications with the BCC Micro:Bit; how to conceal ZIP Files in NES Cartridges; how to remotely exploit a TetriNET Server; and more. The journal exists to remind us of what a clever engineer can build from a box of parts and a bit of free time. Not to showcase what others have done, but to explain how they did it so that readers can do these and other clever things themselves.


PoC or GTFO, Volume 2

PoC or GTFO, Volume 2

Author: Manul Laphroaig

Publisher: No Starch Press

Published: 2018-08-21

Total Pages: 680

ISBN-13: 1593279353

DOWNLOAD EBOOK

PoC or GTFO, Volume 2 follows-up the wildly popular first volume with issues 9-13 of the eponymous hacker zine. Contributions range from humorous poems to deeply technical essays. The International Journal of Proof-of-Concept or Get The Fuck Out is a celebrated magazine of reverse engineering, retro-computing, and systems internals. This second collected volume holds all of the articles from releases nine to thirteen. Learn how to patch the firmware of a handheld amateur radio, then emulate that radio's proprietary audio code under Linux. How to slow the Windows kernel when exploiting a race condition and how to make a PDF file that is also an Android app, an audio file, or a Gameboy speedrun. How to hack a Wacom pen table with voltage glitching, then hack it again by pure software to read RDID tags from its surface. How to disassemble every last byte of an Atari game and how to bypass every classic form of copy protection on Apple ][. But above all else, beyond the nifty tricks and silly songs, this book exists to remind you what a clever engineer can build from a box of parts with a bit of free time. Not to show you what others have done, but to show you how they did it so that you can do the same.


The YouTube Formula

The YouTube Formula

Author: Derral Eves

Publisher: John Wiley & Sons

Published: 2021-02-24

Total Pages: 355

ISBN-13: 1119716020

DOWNLOAD EBOOK

The Wall Street Journal bestseller! Comes with free online companion course Learn the secrets to getting dramatic results on YouTube Derral Eves has generated over 60 billion views on YouTube and helped 24 channels grow to one million subscribers from zero. In The YouTube Formula: How Anyone Can Unlock the Algorithm to Drive Views, Build an Audience, and Grow Revenue, the owner of the largest YouTube how-to channel provides the secrets to getting the results that every YouTube creator and strategist wants. Eves will reveal what readers can't get anywhere else: the inner workings of the YouTube algorithm that's responsible for determining success on the platform, and how creators can use it to their advantage. Full of actionable advice and concrete strategies, this book teaches readers how to: Launch a channel Create life-changing content Drive rapid view and subscriber growth Build a brand and increase engagement Improve searchability Monetize content and audience Replete with case studies and information from successful YouTube creators, The YouTube Formula is perfect for any creator, entrepreneur, social media strategist, and brand manager who hopes to see real commercial results from their work on the platform.


Pentesting Azure Applications

Pentesting Azure Applications

Author: Matt Burrough

Publisher: No Starch Press

Published: 2018-07-23

Total Pages: 218

ISBN-13: 1593278632

DOWNLOAD EBOOK

A comprehensive guide to penetration testing cloud services deployed with Microsoft Azure, the popular cloud computing service provider used by companies like Warner Brothers and Apple. Pentesting Azure Applications is a comprehensive guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies. You'll start by learning how to approach a cloud-focused penetration test and how to obtain the proper permissions to execute it; then, you'll learn to perform reconnaissance on an Azure subscription, gain access to Azure Storage accounts, and dig into Azure's Infrastructure as a Service (IaaS). You'll also learn how to: - Uncover weaknesses in virtual machine settings that enable you to acquire passwords, binaries, code, and settings files - Use PowerShell commands to find IP addresses, administrative users, and resource details - Find security issues related to multi-factor authentication and management certificates - Penetrate networks by enumerating firewall rules - Investigate specialized services like Azure Key Vault, Azure Web Apps, and Azure Automation - View logs and security events to find out when you've been caught Packed with sample pentesting scripts, practical advice for completing security assessments, and tips that explain how companies can configure Azure to foil common attacks, Pentesting Azure Applications is a clear overview of how to effectively perform cloud-focused security tests and provide accurate findings and recommendations.


Spam Kings

Spam Kings

Author: Brian S. McWilliams

Publisher: "O'Reilly Media, Inc."

Published: 2005

Total Pages: 370

ISBN-13: 0596804504

DOWNLOAD EBOOK

Looks at a variety of spam entrepreneurs and how anti-spam activists are trying to stop their activities.


SCP Foundation: Iris Through the Looking-Glass (Light Novel) Vol. 1

SCP Foundation: Iris Through the Looking-Glass (Light Novel) Vol. 1

Author: Akira

Publisher: National Geographic Books

Published: 2020-01-28

Total Pages: 0

ISBN-13: 1645051773

DOWNLOAD EBOOK

WHAT’S WRONG WITH THIS PICTURE?! An ordinary boy encounters the paranormal when a photo of the same girl starts inexplicably showing up in every book he opens. One day, the girl reaches out and pulls him into the photo to her location: a cell in a top-secret facility belonging to the SCP Foundation, an organization dedicated to the research and containment of people, objects and phenomena that defy reality! Even worse: they’ve deemed him a threat to be contained, and he’s going to have to work with them if he ever wants to see the outside world again! Content relating to the SCP Foundation, including the SCP Foundation logo, is licensed under Creative Commons Attribution-Sharealike 3.0 and all concepts originate from http://www.scp-wiki.net and its authors. SCP Foundation: Iris Through the Looking Glass, being derived from this content, is also released under Creative Commons Attribution-Sharealike 3.0. To view a copy of the license, please visit https://creativecommons.org/licenses/by-sa/3.0/ or contact Creative Commons, PO Box 1866, Mountain View, CA 94042, USA. See full list of credits at https://sevenseasentertainment.com/scp-credits/


Game Hacking

Game Hacking

Author: Nick Cano

Publisher: No Starch Press

Published: 2016-07-01

Total Pages: 305

ISBN-13: 1593276699

DOWNLOAD EBOOK

You don’t need to be a wizard to transform a game you like into a game you love. Imagine if you could give your favorite PC game a more informative heads-up display or instantly collect all that loot from your latest epic battle. Bring your knowledge of Windows-based development and memory management, and Game Hacking will teach you what you need to become a true game hacker. Learn the basics, like reverse engineering, assembly code analysis, programmatic memory manipulation, and code injection, and hone your new skills with hands-on example code and practice binaries. Level up as you learn how to: –Scan and modify memory with Cheat Engine –Explore program structure and execution flow with OllyDbg –Log processes and pinpoint useful data files with Process Monitor –Manipulate control flow through NOPing, hooking, and more –Locate and dissect common game memory structures You’ll even discover the secrets behind common game bots, including: –Extrasensory perception hacks, such as wallhacks and heads-up displays –Responsive hacks, such as autohealers and combo bots –Bots with artificial intelligence, such as cave walkers and automatic looters Game hacking might seem like black magic, but it doesn’t have to be. Once you understand how bots are made, you’ll be better positioned to defend against them in your own games. Journey through the inner workings of PC games with Game Hacking, and leave with a deeper understanding of both game design and computer security.


Bug Bounty Bootcamp

Bug Bounty Bootcamp

Author: Vickie Li

Publisher: No Starch Press

Published: 2021-11-16

Total Pages: 444

ISBN-13: 1718501552

DOWNLOAD EBOOK

Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them. You’ll also learn how to navigate bug bounty programs set up by companies to reward security professionals for finding bugs in their web applications. Bug bounty programs are company-sponsored programs that invite researchers to search for vulnerabilities on their applications and reward them for their findings. This book is designed to help beginners with little to no security experience learn web hacking, find bugs, and stay competitive in this booming and lucrative industry. You’ll start by learning how to choose a program, write quality bug reports, and maintain professional relationships in the industry. Then you’ll learn how to set up a web hacking lab and use a proxy to capture traffic. In Part 3 of the book, you’ll explore the mechanisms of common web vulnerabilities, like XSS, SQL injection, and template injection, and receive detailed advice on how to find them and bypass common protections. You’ll also learn how to chain multiple bugs to maximize the impact of your vulnerabilities. Finally, the book touches on advanced techniques rarely covered in introductory hacking books but that are crucial to understand to hack web applications. You’ll learn how to hack mobile apps, review an application’s source code for security issues, find vulnerabilities in APIs, and automate your hacking process. By the end of the book, you’ll have learned the tools and techniques necessary to be a competent web hacker and find bugs on a bug bounty program.


Cyberjutsu

Cyberjutsu

Author: Ben McCarty

Publisher: No Starch Press

Published: 2021-04-26

Total Pages: 266

ISBN-13: 1718500548

DOWNLOAD EBOOK

Like Sun Tzu's Art of War for Modern Business, this book uses ancient ninja scrolls as the foundation for teaching readers about cyber-warfare, espionage and security. Cyberjutsu is a practical cybersecurity field guide based on the techniques, tactics, and procedures of the ancient ninja. Cyber warfare specialist Ben McCarty’s analysis of declassified Japanese scrolls will show how you can apply ninja methods to combat today’s security challenges like information warfare, deceptive infiltration, espionage, and zero-day attacks. Learn how to use key ninja techniques to find gaps in a target’s defense, strike where the enemy is negligent, master the art of invisibility, and more. McCarty outlines specific, in-depth security mitigations such as fending off social engineering attacks by being present with “the correct mind,” mapping your network like an adversary to prevent breaches, and leveraging ninja-like traps to protect your systems. You’ll also learn how to: Use threat modeling to reveal network vulnerabilities Identify insider threats in your organization Deploy countermeasures like network sensors, time-based controls, air gaps, and authentication protocols Guard against malware command and-control servers Detect attackers, prevent supply-chain attacks, and counter zero-day exploits Cyberjutsu is the playbook that every modern cybersecurity professional needs to channel their inner ninja. Turn to the old ways to combat the latest cyber threats and stay one step ahead of your adversaries.


Game Engine Black Book: DOOM

Game Engine Black Book: DOOM

Author: Fabien Sanglard

Publisher: Software Wizards

Published:

Total Pages: 432

ISBN-13:

DOWNLOAD EBOOK

It was early 1993 and id Software was at the top of the PC gaming industry. Wolfenstein 3D had established the First Person Shooter genre and sales of its sequel Spear of Destiny were skyrocketing. The technology and tools id had taken years to develop were no match for their many competitors. It would have been easy for id to coast on their success, but instead they made the audacious decision to throw away everything they had built and start from scratch. Game Engine Black Book: Doom is the story of how they did it. This is a book about history and engineering. Don’t expect much prose (the author’s English has improved since the first book but is still broken). Instead you will find inside extensive descriptions and drawings to better understand all the challenges id Software had to overcome. From the hardware -- the Intel 486 CPU, the Motorola 68040 CPU, and the NeXT workstations -- to the game engine’s revolutionary design, open up to learn how DOOM changed the gaming industry and became a legend among video games.