Enjoy fast, free delivery, exclusive deals, and award-winning movies & TV shows with Prime
Try Prime
and start saving today with fast, free delivery
Amazon Prime includes:
Fast, FREE Delivery is available to Prime members. To join, select "Try Amazon Prime and start saving today with Fast, FREE Delivery" below the Add to Cart button.
Amazon Prime members enjoy:- Cardmembers earn 5% Back at Amazon.com with a Prime Credit Card.
- Unlimited Free Two-Day Delivery
- Streaming of thousands of movies and TV shows with limited ads on Prime Video.
- A Kindle book to borrow for free each month - with no due dates
- Listen to over 2 million songs and hundreds of playlists
- Unlimited photo storage with anywhere access
Important: Your credit card will NOT be charged when you start your free trial or if you cancel during the trial period. If you're happy with Amazon Prime, do nothing. At the end of the free trial, your membership will automatically upgrade to a monthly membership.
-14% $25.61$25.61
Ships from: Amazon Sold by: RNA TRADE LLC
$23.79$23.79
Ships from: Amazon Sold by: book-exchange
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
OK
The Hacker Playbook 3: Practical Guide To Penetration Testing
Explore your book, then jump right back to where you left off with Page Flip.
View high quality images that let you zoom in to take a closer look.
Enjoy features only possible in digital – start reading right away, carry your library with you, adjust the font, create shareable notes and highlights, and more.
Discover additional details about the events, people, and places in your book, with Wikipedia integration.
Purchase options and add-ons
Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. With a combination of new strategies, attacks, exploits, tips and tricks, you will be able to put yourself in the center of the action toward victory.
The main purpose of this book is to answer questions as to why things are still broken. For instance, with all the different security products, secure code reviews, defense in depth, and penetration testing requirements, how are we still seeing massive security breaches happening to major corporations and governments? The real question we need to ask ourselves is, are all the safeguards we are putting in place working? This is what The Hacker Playbook 3 - Red Team Edition is all about.
By now, we are all familiar with penetration testing, but what exactly is a Red Team? Red Teams simulate real-world, advanced attacks to test how well your organization's defensive teams respond if you were breached. They find the answers to questions like: Do your incident response teams have the right tools, skill sets, and people to detect and mitigate these attacks? How long would it take them to perform these tasks and is it adequate? This is where you, as a Red Teamer, come in to accurately test and validate the overall security program.
THP3 will take your offensive hacking skills, thought processes, and attack paths to the next level. This book focuses on real-world campaigns and attacks, exposing you to different initial entry points, exploitation, custom malware, persistence, and lateral movement--all without getting caught! This heavily lab-based book will include multiple Virtual Machines, testing environments, and custom THP tools.
So grab your helmet and let's go break things! For more information, visit http://thehackerplaybook.com/about/.
- ISBN-101980901759
- ISBN-13978-1980901754
- Publication dateMay 2, 2018
- LanguageEnglish
- Dimensions7 x 0.66 x 10 inches
- Print length289 pages
Frequently bought together
Similar items that may deliver to you quickly
Product details
- Publisher : Independently published (May 2, 2018)
- Language : English
- Paperback : 289 pages
- ISBN-10 : 1980901759
- ISBN-13 : 978-1980901754
- Item Weight : 1.12 pounds
- Dimensions : 7 x 0.66 x 10 inches
- Best Sellers Rank: #248,904 in Books (See Top 100 in Books)
- #167 in Computer Hacking
- #181 in Computer Network Security
- #5,919 in Unknown
- Customer Reviews:
About the author
Peter Kim has been in the information security industry for more than 14 years and has been running Penetration Testing/Red Teams for more than 12 years. He has worked for multiple utility companies, Fortune 1000 entertainment companies, government agencies, and large financial organizations. Although he is most well-known for The Hacker Playbook series, his passions are building a safe security community, mentoring students, and training others. He founded and maintains one of Southern California's largest technical security clubs called LETHAL (www.meetup.com/LETHAL), performs private training at his warehouse LETHAL Security (lethalsecurity.com), and runs a boutique penetration testing firm called Secure Planet (www.SecurePla.net).
Peter's main goal with The Hacker Playbook series is to instill passion into his readers and get them to think outside the box. With the ever-changing environment of security, he wants to help build the next generation of security professionals.
Feel free to contact Peter Kim for any of the following:
• Questions about the book: book@thehackerplaybook.com
• Twitter: @hackerplaybook
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonReviews with images
-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
Peter does an excellent job breaking down each phase of an engagement into it's own contained section. This makes it easy for red team operators to go back and reference a particular tool, as there are dedicated sections for initial setup, reconnaissance, web app, etc.
Lastly, I have to compliment Peter's ability to engage his audience. The book incorporates internet-accessible web/network challenges. This is great if you don't have a handy lab to test the discovery tools and attacks out against. This extra attention to detail further enables readers to grasp concepts by actually executing a simulated attack.
Most useful chapters are on phishing methods, AV bypass through meterpreter/payload recompilation and encoding, and some OSINT data collection.
A must-read for security professionals on both sides.
I can read a page at a time, and get general information, though he does go into some detail, I think. He claims to not be a writer, but its produced in such a way that's fine to read. Its not all "algorithms" or "numbers", its paragraph format with some examples thrown about.
This book is as the disclaimer author says (paraphrased), good-guy-hackers. Don't do this illegally, or you'll get in trouble...but if your helping your own company out, here's how to do it...gosh I hope I'm remembering the authors note right XD
Top reviews from other countries
Lo que realmente aprecio es la forma en que el autor presenta casos de estudio del mundo real, proporcionando escenarios prácticos que ilustran los conceptos discutidos. Esta conexión entre la teoría y la práctica hace que la información sea accesible incluso para aquellos que están dando sus primeros pasos en el campo de la seguridad informática.
Además, la estructura del libro es clara y bien organizada, lo que facilita el seguimiento y la asimilación de la información. Desde la planificación de una prueba de penetración hasta la ejecución y el análisis de resultados, cada fase se aborda de manera exhaustiva.
En resumen, "The Hacker Playbook 3" es más que un libro; es una herramienta esencial para aquellos que buscan entender y mejorar sus habilidades en el campo de la ciberseguridad. Este libro ha encontrado un lugar destacado en mi estantería, y lo recomiendo encarecidamente a todos aquellos que estén interesados en el emocionante y siempre cambiante mundo de la seguridad informática.