The Hacker Playbook 2

Practical Guide To Penetration Testing

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book The Hacker Playbook 2 by Peter Kim, Secure Planet LLC
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Peter Kim ISBN: 1230000582025
Publisher: Secure Planet LLC Publication: July 1, 2015
Imprint: Language: English
Author: Peter Kim
ISBN: 1230000582025
Publisher: Secure Planet LLC
Publication: July 1, 2015
Imprint:
Language: English

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.

Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software.

From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.

This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.

Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.

Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software.

From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.

This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.

Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.

More books from Application Software

Cover of the book Logging by Peter Kim
Cover of the book Material Appearance Modeling: A Data-Coherent Approach by Peter Kim
Cover of the book Secure Programming with Static Analysis by Peter Kim
Cover of the book Reinventing the IT Department by Peter Kim
Cover of the book SharePoint 2010 for Project Management by Peter Kim
Cover of the book A Simpler Guide to Online Security for Everyone: How to protect yourself and stay safe from fraud, scams and hackers with easy cyber security tips for your Gmail, Docs and other Google services by Peter Kim
Cover of the book ITIL and Organizational Change by Peter Kim
Cover of the book Da InDesign 6 all’Epub e Mobi by Peter Kim
Cover of the book Public-Key Cryptography – PKC 2018 by Peter Kim
Cover of the book Microsoft Project 2010 In Depth by Peter Kim
Cover of the book Money, Banking, and the Business Cycle by Peter Kim
Cover of the book Social Media e Viralità: Nuovi Modi di Comunicare by Peter Kim
Cover of the book The Adobe Photoshop Lightroom 2 Book by Peter Kim
Cover of the book Practical Time Series Analysis Using SAS by Peter Kim
Cover of the book Learning VMware vCloud Air by Peter Kim
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy