Curriculum
-
1
Book Preview
-
2
Introduction
-
(Included in full purchase)
Introduction
-
(Included in full purchase)
-
3
Chapter 1 : Introduction to Infrastructure Attacks
-
(Included in full purchase)
Introduction to Infrastructure Attacks
-
(Included in full purchase)
-
4
Chapter 2 : Initial Reconnaissance and Enumeration
-
(Included in full purchase)
Initial Reconnaissance and Enumeration
-
(Included in full purchase)
-
5
Chapter 3 : Attacking Routers
-
(Included in full purchase)
Attacking Routers
-
(Included in full purchase)
-
6
Chapter 4 : Looking for a Foothold
-
(Included in full purchase)
Looking for a Foothold
-
(Included in full purchase)
-
7
Chapter 5 : Getting Shells
-
(Included in full purchase)
Getting Shells
-
(Included in full purchase)
-
8
Chapter 6 : Enumeration On Microsoft Windows
-
(Included in full purchase)
Enumeration On Microsoft Windows
-
(Included in full purchase)
-
9
Chapter 7 : Enumeration on Linux
-
(Included in full purchase)
Enumeration on Linux
-
(Included in full purchase)
-
10
Chapter 8 : Internal Network Reconnaissance
-
(Included in full purchase)
Internal Network Reconnaissance
-
(Included in full purchase)
-
11
Chapter 9 : Lateral Movement
-
(Included in full purchase)
Lateral Movement
-
(Included in full purchase)
-
12
Chapter 10 : Achieving First-level Pivoting
-
(Included in full purchase)
Achieving First-level Pivoting
-
(Included in full purchase)
-
13
Chapter 11 : Attacking Databases
-
(Included in full purchase)
Attacking Databases
-
(Included in full purchase)
-
14
Chapter 12 : AD Reconnaissance and Enumeration
-
(Included in full purchase)
AD Reconnaissance and Enumeration
-
(Included in full purchase)
-
15
Chapter 13 : Path to Domain Admin
-
(Included in full purchase)
Path to Domain Admin
-
(Included in full purchase)
-
16
Chapter 14 : Playing with Hashes and Tickets
-
(Included in full purchase)
Playing with Hashes and Tickets
-
(Included in full purchase)
-
17
Index
-
(Included in full purchase)
Index
-
(Included in full purchase)
About the course
Embark on an immersive journey into the world of ethical hacking with "Infrastructure Attack Strategies for Ethical Hacking". From the initial stages of reconnaissance and enumeration to advanced techniques like attacking routers, databases, and Microsoft Windows systems, this handbook equips you with the skills needed for a comprehensive infrastructure compromise. Encompassing both external and internal enumeration techniques, the book delves into attacking routers and services, establishing footholds, privilege escalation, lateral movement, and exploiting databases and Active Directory. You will gain proficiency in methodologies and tools for ethically compromising systems, navigating through networks, collecting intelligence, and providing effective remediation advice. This handbook places a strong emphasis on interactive learning, focusing on playing with hashes, tickets, and keys. With its practical approach and expert guidance, this book serves as an invaluable resource, empowering you to confidently master advanced infrastructure attack strategies and bolster your cybersecurity expertise.
.jpg)
About the Author
Himanshu Sharma and Harpreet Singh are accomplished cybersecurity professionals with extensive experience in ethical hacking, red teaming, and vulnerability research. Himanshu, Head of Security at 5ireChain, is a CRTO, OSCP, and OSWP holder, recognized by top tech firms and a frequent speaker at global conferences like Blackhat and RSA. Harpreet, author of key cybersecurity books and a speaker at Pass-The-Salt, holds OSED, OSCP, OSWP, and CRTO certifications. Both are respected voices in the cybersecurity community, contributing through training, public speaking, and responsible vulnerability disclosures.