Monthly Archives: July 2024

Phishing Attacks: Advanced Attack Techniques 2

Phishing is an attack technique where an attacker uses fraudulent emails or texts, or copycats websites to get a victim to share valuable personal information such as account numbers, social security numbers, or victim’s login user-name and password. This technique is also used to trick the victim into running malicious code on the system, so that an attacker can control the user’s system and thereby get acces to user’s or organization’s sensitive data. This book is an introduction for the reader in the world of Phishing attacks. The book focuses on the different kinds of Phishing attacks and provides an overview of some of the common open source tools that can be used to execute Phishing campaigns. Red teams, pentesters, attackers, etc. all use Phishing techniques to compromise a user’s machine. It is necessary for Red teams and pentesters to understand the various payload delivery mechanisms used by current threat profiles. The book then delves into the common Phishing payload delivery mechanisms used by current threat profiles. It also introduces some new and uncommon payload delivery techniques that the author has used in the past to bypass and get through email filters as well as end-point detection systems. The second edition of this book adds new ways that are used by current threat actors to take over and compromise their victims. This includes exploiting Windows URIs, Outlook and Contact application files, utilizing and compromising cloud services, etc.

Buy it at Amazon.

Advanced Penetration Testing: Hacking Satellite Communication

Satellite operators have been lucky so far. The prevailing wisdom is that hacking this kit would be prohibitively expensive due to the high cost of ground stations that communicate with the orbital birds, and that such hardware benefited from security by obscurity that getting hold of the details of the firmware would be too difficult. Neither is true, the research indicates. For example, both AWS and Microsoft’s Azure now offer Ground Station as a Service (GSaaS) to communicate with LEO satellites, so communication is simply a matter of plonking down a credit card. As for getting details on firmware, the commercial space industry has flourished in recent years and many of the components used on multiple platforms are easy to buy and study. This book gives insight into how satellite communication can be intercepted and how easy it is for someone to hack satellite terminals.

Buy it at Amazon.

ADVANCED PENETRATION TESTING: HACKING DOCKER 2

This is the second part of the book and it delves deeper into analyzing the security of Docker containers. It looks at various attacks that allow an attacker to compromise Docker containers. In addition, this part also introduces readers to Docker Swarm and shows how docker swarm can be compromised. This book should help pentesters, red teamers and offensive security folks understand how to compromise Docker containers and its orchestration environment called Docker Swarm.

Buy it at Amazon.