Jump to ratings and reviews
Rate this book

Hacking the Planet #7

How to Hack Like a LEGEND: A hacker’s tale breaking into a secretive offshore company

Rate this book
This is the story of a hacker who met his match while breaking into a machine learning, behavioral analysis, artificial intelligence... Most hacking tools simply crash and burn in such a hostile environment.
What is a hacker to do when facing such a fully equipped opponent?

The source code for all custom attack payloads are provided and explained thoroughly in the book.

Cybersecurity at its best
We start by building a resilient C2 infrastructure using cloud providers, HTTP redirectors and SSH tunnels . The idea is to hide behind an array of disposable machines that we can renew in a matter of seconds to completely change our internet footprint .
We then set up step-by-step a phishing fake website, postfix server, DKIM signing , SPF and DMARC .

The Art of intrusion
Instead of hacking directly our mark (an offshore company), we target one of their suppliers that we identified using OSINT techniques . We collect a couple of passwords thanks to our phishing platform and leverage the remote Citrix access to put our first foot inside.
We bypass Applocker and Constrained Language on PowerShell to achieve code execution, then start our Active Directory reconnaissance .

Minutes later, we are kicked out of the network due to suspicious activity!

The art of exploitation
We exploit a flaw in password patterns to get back on the Citrix server. We are facing MS ATA and the QRADAR SIEM . We learn to evade them using various hacking tricks and manage to disable all new Windows Server 2016 security features (AMSI, ScriptBlock Logging, etc.).
We also face Windows next-gen antivirus (ATP) while trying to get credentials belonging to developers we suspect are working on the product used by the offshore company.
We end up backdooring the accounting software in a way to evade most security and functional tests.

Forget penetration testing, time for some red team
Our backdoor triggers a fileless malware that give us access to our final target's internal network . After that it's just a cakewalk to achieve domain admin privileges and access personal data of thousands of shell companies and their end beneficiaries.


This book’s edition assumes prior knowledge of basic computer security principles such as NTLM, pass-the-hash, Windows Active Directory, group policy objects and so forth. If you are scantly comfortable with these concepts, I strongly encourage you to first read How to Hack Like a Pornstar ( or How to Hack Like a God ( before taking on this book.

332 pages, Kindle Edition

Published April 7, 2018

25 people are currently reading
93 people want to read

About the author

Sparc Flow

11 books43 followers
Sparc Flow is a computer security expert.
He specializes in ethical hacking and has presented his research at international security conferences like Black Hat, DEF CON, Hack In The Box,...

While his day job consists mainly of hacking companies and showing them how to fix their security vulnerabilities, his passion is writing and sharing the insight he gained in the security field

His first book "How to Hack Like a Pornstar" captures the essence of multiple situations he faced in real life and offers the reader a peak into the world of hacking and pentesting

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
22 (73%)
4 stars
4 (13%)
3 stars
2 (6%)
2 stars
2 (6%)
1 star
0 (0%)
Displaying 1 - 3 of 3 reviews
40 reviews
January 25, 2023
Riktigt cool bok om hur man steg för steg hackar sig in på ett företag, via en supply chain-omväg, och undviker intrångsskydd och antivirusprogram.

Kan inte säga att jag förstod alla detaljer, men kul skrivet som en berättelse med äkta fungerande kod i bland annat C# och Powershell.
Profile Image for عَبدُالكَرِيمْ .
207 reviews3 followers
April 5, 2019
By far the most interesting book of the theology "Hack the planet".

In this book a more advanced attack was described. I ended up learning couple of cool new tricks.

Highly recommend it.
1 review
May 10, 2019
Great book!

Great book! Very easy and fun to read! I love the aproach on writing this book! - - - -
Displaying 1 - 3 of 3 reviews

Can't find what you're looking for?

Get help and learn more about the design.