eBooks-it.org Logo
eBooks-IT.org Inner Image

The Hacker Playbook 2

Practical Guide to Penetration Testing

The Hacker Playbook 2 Image

Book Details:

Publisher:CreateSpace Independent Publishing Platform
Series: CreateSpace , Practical
Author:Peter Kim
Edition:1
ISBN-10:1512214566
ISBN-13:9781512214567
Pages:339
Published:Jun 20 2015
Posted:Jul 19 2016
Language:English
Book format:PDF
Book size:23.21 MB

Book Description:

Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. "The Hacker Playbook" provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the "game" of penetration hacking features hands-on examples and helpful advice from the top of the field. Through a series of football-style "plays," this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing-including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software. From "Pregame" research to "The Drive" and "The Lateral Pass," the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience. This second version of "The Hacker Playbook" takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code. Whether you're downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker's library-so there's no reason not to get in the game.

Download Link:

Related Books:

The Hacker Playbook

Practical Guide To Penetration Testing
The Hacker Playbook Image
Just as a professional athlete doesnt show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the game of penetration hacking features hands-on examples and helpful advice from the top of the field. Through a series of football-style plays, this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing - including attacking different types of networks, pivoting through security controls, and evading antivirus software. From Pregame research to The Drive and The Lateral Pass, ...

The Hacker's Handbook

The Strategy Behind Breaking Into and Defending Networks
The Hacker's Handbook Image
The Hackers Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders. This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, te...

Insider Attack and Cyber Security

Beyond the Hacker
Insider Attack and Cyber Security Image
This book defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia University and Dartmouth College. The book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in security, and a range of topics from critical IT infrastructure to insider threats. In some ways, the insider problem is the ultimate security problem....



2007 - 2018 © eBooks-IT.org