Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field. Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, and evading antivirus software. From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience. Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game....
|Title||:||The Hacker Playbook: Practical Guide To Penetration Testing|
|Format Type||:||Kindle Edition|
|Number of Pages||:||294 Pages|
|Status||:||Available For Download|
|Last checked||:||21 Minutes ago!|
The Hacker Playbook: Practical Guide To Penetration Testing Reviews
This book lays a great framework for running a successful penetration test. This book does not go in depth with any technique or tool but does a good job at instructing the reader where to go to learn more by providing links to presentations or other books. If you don't know your way around Metasploit+Linux+Windows, I'd start off with a different book. This book is more of a reference guide than instructional, so I don't see people without a little background knowledge retaining the information.If I had read it at the time of publication, I probably would of rated it five stars. A few tools came out since publication which would of been great mentions. For instance it states do not upload to VirusTotal, but doesn't mention a great way to do virus scans yourself. PlagueScanner, would of been great right here, but is very new software (saw the presentation at the Shmoocon 2015 Firetalks).I read it in ~5 days on the Kindle PaperWhite, the formatting was better than most technical eBooks.
I perform pentests everyday for a living and this is an invaluable book. I would recommend it to anyone starting or even any seasoned pentester. #Don'tLeaveHomeWithoutIt
Thought the book started off incredibly poorly for the reconaissance and web exploitation sections. However the post-exploitation and lateral movement chapters were outstanding and somewhat redeemed the book.
That's totally a worth to read book.For beginner it will give Idea about a lot of techniques out there , and for professionals It really can be considered as large amount of notes which can be depend on during pentesting4* because there still a lot of technologies and techniques that haven't been discussed in the book (which am sure they cant be collected in one book)At the moment am writing that review , second edition is already outwill start reading hopefully it filled the gabs in this edition
The book tried to cover a lot of penetration testing aspects under one cover (web vulnerabilities, system exploitation, AV evasion, social engineering,..etc). It's useful for professional penetration testers (not beginners) who would like to learn tricks to help them do their job. Sometimes a small trick can help you penetrate a million dollar system.
it is a good book which many useful ways to evade antivirus and create web shells.I would recommend reading about metasploit and network scanning before reading this bookthe book is full of URLs .overall, it is really good book
You need liters of "smart juice" (coffee) to try all the tools in this book. Appreciated the straightforward approach and had lots of fun playing around. Honestly, I started monitoring my access point to check if my neighbors read this book as well!
A great book if you know how hacking works and want a step by step guide through a professional pentest. Both engaging and informative without being filled with fluff.
Location: PTI IRCAccession No: DL027626
Very little by way of new material, but if one is just starting out, this book is decent for its purpose.