The Hacker Playbook 2

Practical Guide To Penetration Testing

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book The Hacker Playbook 2 by Peter Kim, Secure Planet LLC
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Peter Kim ISBN: 1230000582025
Publisher: Secure Planet LLC Publication: July 1, 2015
Imprint: Language: English
Author: Peter Kim
ISBN: 1230000582025
Publisher: Secure Planet LLC
Publication: July 1, 2015
Imprint:
Language: English

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.

Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software.

From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.

This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.

Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.

Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software.

From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.

This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.

Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.

More books from Application Software

Cover of the book Pragmatic Application of Service Management by Peter Kim
Cover of the book Microsoft Project 2013 Step by Step by Peter Kim
Cover of the book OpenGL Programming Guide by Peter Kim
Cover of the book Parallel Computing: Fundamentals, Applications and New Directions by Peter Kim
Cover of the book Internet Expliqué Aux Séniors Guide Complet by Peter Kim
Cover of the book Cyber Survival Manual by Peter Kim
Cover of the book Analysis and Modeling of Complex Data in Behavioral and Social Sciences by Peter Kim
Cover of the book Advanced Concepts for Intelligent Vision Systems by Peter Kim
Cover of the book Medical Image Recognition, Segmentation and Parsing by Peter Kim
Cover of the book Oracle Exalytics Revealed by Peter Kim
Cover of the book Network and System Security by Peter Kim
Cover of the book Advanced Video Coding Systems by Peter Kim
Cover of the book Trust, Privacy and Security in Digital Business by Peter Kim
Cover of the book Windows Server 2016 Administration Fundamentals by Peter Kim
Cover of the book Sites Web avec Joomla ! 1.6 : 100% pratique by Peter Kim
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy