Cobalt Red


Book Description

The revelatory Pulitzer Prize finalist for General Nonfiction, New York Times and Publishers Weekly bestseller, shortlisted for the Financial Times Best Business Book of the Year Award. An unflinching investigation reveals the human rights abuses behind the Congo’s cobalt mining operation—and the moral implications that affect us all. Cobalt Red is the searing, first-ever exposé of the immense toll taken on the people and environment of the Democratic Republic of the Congo by cobalt mining, as told through the testimonies of the Congolese people themselves. Activist and researcher Siddharth Kara has traveled deep into cobalt territory to document the testimonies of the people living, working, and dying for cobalt. To uncover the truth about brutal mining practices, Kara investigated militia-controlled mining areas, traced the supply chain of child-mined cobalt from toxic pit to consumer-facing tech giants, and gathered shocking testimonies of people who endure immense suffering and even die mining cobalt. Cobalt is an essential component to every lithium-ion rechargeable battery made today, the batteries that power our smartphones, tablets, laptops, and electric vehicles. Roughly 75 percent of the world’s supply of cobalt is mined in the Congo, often by peasants and children in sub-human conditions. Billions of people in the world cannot conduct their daily lives without participating in a human rights and environmental catastrophe in the Congo. In this stark and crucial book, Kara argues that we must all care about what is happening in the Congo—because we are all implicated.




Bonded Labor


Book Description

Focusing on the pervasive, deeply entrenched, and wholly unjust system of bonded labor, Kara delves into this ancient and ever-evolving mode of slavery, which ensnares roughly six out of every ten slaves in the world. He provides a thorough economic, historical, and legal overview of bonded labor, describes the violent enslavement of millions, and follows supply chains directly to Western consumers.




Hands-On Red Team Tactics


Book Description

Your one-stop guide to learning and implementing Red Team tactics effectively Key FeaturesTarget a complex enterprise environment in a Red Team activityDetect threats and respond to them with a real-world cyber-attack simulationExplore advanced penetration testing tools and techniquesBook Description Red Teaming is used to enhance security by performing simulated attacks on an organization in order to detect network and system vulnerabilities. Hands-On Red Team Tactics starts with an overview of pentesting and Red Teaming, before giving you an introduction to few of the latest pentesting tools. We will then move on to exploring Metasploit and getting to grips with Armitage. Once you have studied the fundamentals, you will learn how to use Cobalt Strike and how to set up its team server. The book introduces some common lesser known techniques for pivoting and how to pivot over SSH, before using Cobalt Strike to pivot. This comprehensive guide demonstrates advanced methods of post-exploitation using Cobalt Strike and introduces you to Command and Control (C2) servers and redirectors. All this will help you achieve persistence using beacons and data exfiltration, and will also give you the chance to run through the methodology to use Red Team activity tools such as Empire during a Red Team activity on Active Directory and Domain Controller. In addition to this, you will explore maintaining persistent access, staying untraceable, and getting reverse connections over different C2 covert channels. By the end of this book, you will have learned about advanced penetration testing tools, techniques to get reverse shells over encrypted channels, and processes for post-exploitation. What you will learnGet started with red team engagements using lesser-known methodsExplore intermediate and advanced levels of post-exploitation techniquesGet acquainted with all the tools and frameworks included in the Metasploit frameworkDiscover the art of getting stealthy access to systems via Red TeamingUnderstand the concept of redirectors to add further anonymity to your C2Get to grips with different uncommon techniques for data exfiltrationWho this book is for Hands-On Red Team Tactics is for you if you are an IT professional, pentester, security consultant, or ethical hacker interested in the IT security domain and wants to go beyond Penetration Testing. Prior knowledge of penetration testing is beneficial.




The Connoisseur


Book Description







A system of mineralogy


Book Description










Fishes


Book Description