The Hacker Playbook 2

Practical Guide To Penetration Testing

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book The Hacker Playbook 2 by Peter Kim, Secure Planet LLC
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Peter Kim ISBN: 1230000582025
Publisher: Secure Planet LLC Publication: July 1, 2015
Imprint: Language: English
Author: Peter Kim
ISBN: 1230000582025
Publisher: Secure Planet LLC
Publication: July 1, 2015
Imprint:
Language: English

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.

Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software.

From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.

This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.

Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.

Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software.

From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.

This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.

Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.

More books from Application Software

Cover of the book Podcasting for Teachers by Peter Kim
Cover of the book Digital Media and Technologies for Virtual Artistic Spaces by Peter Kim
Cover of the book VBA Bible: Save Your Time with VBA by Peter Kim
Cover of the book Grundfragen der Medienwirtschaft by Peter Kim
Cover of the book Im Strudel der Gewalt by Peter Kim
Cover of the book Healthcare Information Privacy and Security by Peter Kim
Cover of the book Computer Vision – ACCV 2018 by Peter Kim
Cover of the book Research and Development in Art, Design and Creativity by Peter Kim
Cover of the book Image Analysis and Recognition by Peter Kim
Cover of the book Analytical and Computational Methods in Probability Theory by Peter Kim
Cover of the book "Der eBook-Maker für jedermann/-frau" Oder eine Kurzanleitung mit Illustrationen für Ihr eigenes eBook by Peter Kim
Cover of the book Microsoft Word 2016 Step By Step by Peter Kim
Cover of the book High Dynamic Range Imaging by Peter Kim
Cover of the book Excel 2016 Pivot Table Data Crunching (includes Content Update Program) by Peter Kim
Cover of the book Sicherheit und Vertrauen im Internet by Peter Kim
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy