Breaking into. Techniques, tricks and secrets of hackers.
Instant download
after payment (24/7)
Wide range of formats
(for all gadgets)
Full book
(including for Apple and Android)
The collection of selected articles from the Hacker magazine describes the technology for searching and exploiting vulnerabilities, sandbox detection and anti-debugging, managing processes in the Microsoft Windows operating system and masking them. Describes methods of data exchange between malicious programs and the control server. Specific examples are given of writing a Windows kernel mode driver, intercepting application control via WinAPI, and creating a stealer to obtain passwords from Chrome and Firefox browsers. Techniques for obfuscation of PowerShell code are described. Separate sections are devoted to hacking iPhone and Apple Watch.
FL/520178/R
Data sheet
- Language
- Russian