The Hacker Playbook 2 1st edition by Peter Kim – Ebook PDF Instant Download/Delivery:1512214566,9781512214567
Full dowload The Hacker Playbook 2 1st edition after payment
Product details:
ISBN 10:1512214566
ISBN 13:9781512214567
Author:Peter Kim
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.
Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software.
From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.
This second version of The Hacker Playbook takes all the best “plays” from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.
Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.
The Hacker Playbook 2 1st Table of contents:
Introduction
Standards Updates Pregame
The Setup Building A Lab Building Out A Domain Building Out Additional Servers
Practice Building Your Penetration Testing Box Setting Up A Penetration Testing Box Hardware Open
Source Versus
Commercial Software Setting Up Your Boxes Setting Up Kali Linux Windows VM Setting Up Windows Power Up With Powershell Easy-P Learning Metasploitable
2 Binary Exploitation Summary Passive Discovery
Open Source Intelligence (OSINT)
Discover Scripts Spiderfoot Creating Password Lists:
Wordhound Brutescrape Using Compromised Lists To Find Email Addresses And Credentials Gitrob
Github Analysis OSINT Data
Collection External/Internal Active Discovery Masscan Sparta Http
Screenshot Vulnerability Scanning: Rapid7 Nexpose/Tenable Nessus
Openvas Web Application Scanning The Process For
Web Scanning Web Application Scanning OWASP
Zap Proxy
People also search for The Hacker Playbook 2 1st:
the hacker playbook 4
the hacker playbook 1/2/3 by peter kim
the hacker playbook practical guide to penetration testing pdf
the hacker playbook 2
the hacker playbook 1/2/3 by peter kim
Reviews
There are no reviews yet.