The Hacker Playbook 2

Practical Guide To Penetration Testing

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book The Hacker Playbook 2 by Peter Kim, Secure Planet LLC
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Peter Kim ISBN: 1230000582025
Publisher: Secure Planet LLC Publication: July 1, 2015
Imprint: Language: English
Author: Peter Kim
ISBN: 1230000582025
Publisher: Secure Planet LLC
Publication: July 1, 2015
Imprint:
Language: English

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.

Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software.

From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.

This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.

Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.

Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software.

From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.

This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.

Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.

More books from Application Software

Cover of the book SketchBook Pro Digital Painting Essentials by Peter Kim
Cover of the book Microsoft Office for the Older and Wiser by Peter Kim
Cover of the book Spectral and Shape Analysis in Medical Imaging by Peter Kim
Cover of the book Enterprise Information Systems by Peter Kim
Cover of the book Data Science for Cyber-Security by Peter Kim
Cover of the book Mastering Unity Shaders and Effects by Peter Kim
Cover of the book Intelligent Document Capture with Ephesoft - Second Edition by Peter Kim
Cover of the book Contemporary Digital Forensic Investigations of Cloud and Mobile Applications by Peter Kim
Cover of the book Crime Prevention Technologies and Applications for Advancing Criminal Investigation by Peter Kim
Cover of the book Digital Geometry by Peter Kim
Cover of the book Cocos2d-x Game Development Blueprints by Peter Kim
Cover of the book Innovative Security Solutions for Information Technology and Communications by Peter Kim
Cover of the book PACK DE LIBROS PASO A PASO by Peter Kim
Cover of the book Spatial Visualization and Professional Competence by Peter Kim
Cover of the book Office 2016 Paso a Paso by Peter Kim
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy