The Hacker Playbook 2 PDF ePub eBook

Books Info:

The Hacker Playbook 2 free pdf Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. "The Hacker Playbook" provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the "game" of penetration hacking features hands-on examples and helpful advice from the top of the field. Through a series of football-style "plays," this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing-including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software. From "Pregame" research to "The Drive" and "The Lateral Pass," the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience. This second version of "The Hacker Playbook" takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code. Whether you're downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker's library-so there's no reason not to get in the game.

About Peter Kim

Peter Kim is the CEO/President of Secure Planet, LLC, a global penetration testing company. He has worked in the security field for almost ten years, and has spent the past seven as a penetration tester. His research has been featured on Wired.com, CNN.com, and various other outlets. Kim has a wide variety of certifications from Sec , GCIH, GCWN, GWAPT, GXPN, and GMOB. He spent several years teaching penetration testing and network security at Howard Community College in Maryland, and he is the founder of LETHAL, a local security hackerspace in Santa Monica, California. You can find out more information about LETHAL at www.meetup/LETHAL, or visit Kim's blog at Secure Planet: http: //www.SecurePla.net.

Details Book

Author : Peter Kim
Publisher : Createspace
Data Published : 20 June 2015
ISBN : 1512214566
EAN : 9781512214567
Format Book : PDF, Epub, DOCx, TXT
Number of Pages : 358 pages
Age + : 15 years
Language : English
Rating :

Reviews The Hacker Playbook 2



17 Comments Add a comment




Related eBooks Download


  • Penetration Testing with the Bash Shell free pdfPenetration Testing with the Bash Shell

    An easy-to-understand. step-by-step practical guide that shows you how to use the Linux Bash terminal tools to solve information security problems. If you are a penetration tester..


  • Unauthorised Access free pdfUnauthorised Access

    The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside..


  • Unauthorised Access free pdfUnauthorised Access

    The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside..


  • Hands-On Ethical Hacking And Network Defense free pdfHands-On Ethical Hacking And Network Defense

    Learn the art of ethical hacking and security testing with "Hands-On Ethical Hacking and Network Defense". Covering the tools and techniques ethical hackers and security testers use to assess and protect computer networks..


  • Hands-On Ethical Hacking And Network Defense free pdfHands-On Ethical Hacking And Network Defense

    Learn the art of ethical hacking and security testing with "Hands-On Ethical Hacking and Network Defense". Covering the tools and techniques ethical hackers and security testers use to assess and protect computer networks..


  • The Hacker Playbook 2 free pdfThe Hacker Playbook 2

    . Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. "The Hacker Playbook" provides