I would like to share a book that goes through a real life hacking scenario : From building phishing malware to hacking a Mainframe (while of course p0wning some Windows Domains

It showcases up to date content with custom scripts and unique hacking techniques
It is different and refreshing from your regular old metasploit how-to tutorials
[Please login or register to view this link]

Enjoy !
Sparc F.