Jump to ratings and reviews
Rate this book

Hacking the Planet #1

How to Hack Like a Pornstar

Rate this book
This is not a book about information security. Certainly not about IT. This is a book about hacking: specifically, how to infiltrate a company’s network, locate their most critical data, and make off with it without triggering whatever shiny new security tool the company wasted their budget on.


Whether you are a wannabe ethical hacker or an experienced pentester frustrated by outdated books and false media reports, this book is definitely for you.


We will set up a fake – but realistic enough – target and go in detail over the main steps to hack the company: building phishing malware, finding vulnerabilities, rooting Windows domains, pwning a mainframe, etc.

ebook

Published September 1, 2017

148 people are currently reading
294 people want to read

About the author

Sparc Flow

11 books44 followers
Sparc Flow is a computer security expert.
He specializes in ethical hacking and has presented his research at international security conferences like Black Hat, DEF CON, Hack In The Box,...

While his day job consists mainly of hacking companies and showing them how to fix their security vulnerabilities, his passion is writing and sharing the insight he gained in the security field

His first book "How to Hack Like a Pornstar" captures the essence of multiple situations he faced in real life and offers the reader a peak into the world of hacking and pentesting

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
46 (42%)
4 stars
28 (26%)
3 stars
19 (17%)
2 stars
9 (8%)
1 star
5 (4%)
Displaying 1 - 13 of 13 reviews
Profile Image for Kajus.
2 reviews
August 30, 2018
Nice and short - from phishing emails to exfiltrating data, doing everything in a sexy way - meaning elegantly and quietly. If you’re a redteamer with like 3 years of experience there will be not too much new but it’s always nice to refresh your knowledge and learn some obscure tricks. Especially enjoyed the exfiltration part as well as Mainframe hacking.
Profile Image for Jari Pirhonen.
458 reviews17 followers
February 12, 2017
Interesting, short, step-by-step introduction how hackers can penetrate organization network and what tools they may use. Good reading to remind you how hard it is to protect every corner of the network. In cyber attacker always has an advantage over defender.
Profile Image for عَبدُالكَرِيمْ .
207 reviews3 followers
March 26, 2019
If you read other books in the set you clearly see a patterns. did the author run out of creative ideas or did he just want to make money ?

The content is still really good but it wasn't as exciting as the other books in the same set. Not sure if the author did this intentionally to increase his passive income from these books. Still a brilliant idea regardless.
Profile Image for Kārlis Bergmanis.
99 reviews5 followers
December 13, 2022
I would not call this a book.
As a writeup - yeah, sure, not the worst out there... but not a book. Basically no "Why" and "How", just step by step list of actions he did to hack one specific scenario.
Profile Image for Ahmed Sultan.
79 reviews10 followers
July 15, 2017
Awesome ,
Just awesome ,
one of the best books I've ever read regarding AD pwning , highly recommended for network pentesters / red team guys
Profile Image for Jaana.
58 reviews7 followers
January 13, 2018
If you’re interested in CTFs, it’s probably a must read. Focuses on AD, specially PowerShell.
Profile Image for Tom V.
34 reviews
October 2, 2023
Fun Fun Fun

What a journey, if you are interested in infosec and reading a step by step on how a pentest is performed, this book might be for you
1 review
February 23, 2017
Not another metasploit tutorial, that's refreshing ! Very PowerShell oriented and uses up-to-date tools.
I need to go through it once more to absorb it all, especially the chapter about stealing data from other computers..some heavy stuff.
Profile Image for C.D..
Author 4 books10 followers
October 12, 2018
Whether you're black hat or white, this book is a must-read for anyone interested in cyber-security.
Displaying 1 - 13 of 13 reviews

Can't find what you're looking for?

Get help and learn more about the design.