Breaking & Entering: A Pocket Guide for Friendly Remote Admins
This user-friendly guide offers a comprehensive offensive security roadmap for sysadmins, penetration testers, and other security professionals.
Get a leg up on your next pen test or CTF with our handy guide!
Previously introduced at DEF CON 29, “Breaking & Entering” is an easy-to-consume, user-friendly resource for sysadmins, penetration testers, and other security professionals. It delivers a comprehensive offensive security roadmap, covering every phase of an engagement from beginning to end – just what you need for your next penetration test or CTF!
Discover techniques and shortcuts for conducting OSINT and reconnaissance, host enumeration and post-exploitation, secure pivoting (tunneling), and exfiltration.
Other things you’ll find inside include:
- Information on how Google hacking (or “Google Dorking”) can allow you to level up your OSINT efforts
- A thorough initial list of commands for investigating a host system
- An SMB/Kernel version chart for matching enumerated information to system versions, common registry locations
- Useful technical documentation references like NIST publications and tunneling worksheets