The Hacker Playbook 2

Practical Guide To Penetration Testing

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book The Hacker Playbook 2 by Peter Kim, Secure Planet LLC
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Peter Kim ISBN: 1230000582025
Publisher: Secure Planet LLC Publication: July 1, 2015
Imprint: Language: English
Author: Peter Kim
ISBN: 1230000582025
Publisher: Secure Planet LLC
Publication: July 1, 2015
Imprint:
Language: English

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.

Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software.

From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.

This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.

Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.

Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software.

From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.

This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.

Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.

More books from Application Software

Cover of the book QGIS By Example by Peter Kim
Cover of the book Cybercriminalité by Peter Kim
Cover of the book Excel 2010 - Le guide complet by Peter Kim
Cover of the book Die Fotos-App unter iOS 10 – Bilder auf iPhone und iPad genießen by Peter Kim
Cover of the book Security for Web Developers by Peter Kim
Cover of the book CUDA for Engineers by Peter Kim
Cover of the book Information and Communication Technology by Peter Kim
Cover of the book Developments in Information Security and Cybernetic Wars by Peter Kim
Cover of the book ServiceNow: Building Powerful Workflows by Peter Kim
Cover of the book InDesign CS4 For Dummies by Peter Kim
Cover of the book Erste Schritte im Online-Marketing by Peter Kim
Cover of the book iPhoto 09 for Mac OS X by Peter Kim
Cover of the book Multimedia Interaction and Intelligent User Interfaces by Peter Kim
Cover of the book Untersuchungsmethoden von Web-Usability: ein kurzer Überblick by Peter Kim
Cover of the book High Performance Linux Clusters with OSCAR, Rocks, OpenMosix, and MPI by Peter Kim
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy