

The Hacker Playbook 3: Practical Guide To Penetration Testing: 9781980901754: Computer Science Books @ desertcart.com Review: BUY THIS BOOK. JUST DO IT! - As good a primary resource and supplemental field book on offensive security as exists. The information is presented in as plain English as is possible and it's clear the author actually wants you to know and learn what he has in his wealth of experience. Real, hands on experience with practical examples that currently work, not just resume fluff. No cryptic talk and/or generic, old examples while withholding the good stuff, no useless buzzwords or self aggrandizement, just the good stuff, pure and simple with as little frills and distraction as possible. For the cost of a delivery pizza, you'll get a book with twice the useful content and none of the page count padding filler that you'll find with almost any of the ~$50 alternatives out there. Review: Great addition to the series, plenty of new material including VMs to practice! - The 3rd addition to the Hacker Playbook series did not disappoint! There was plenty of new material from the last book making the new addition definitely worth the purchase. The author included VMs to actually practice some of the techniques and exploitation methods discussed in the book. My favorite part was a vulnerable web application (included with book) that allows you to put into practice some of the newer web attacks seen today. Attacks against NodeJS templating, NoSQL Injection, more advanced XSS, XXE, deserialization and more.. The author also included some pro tips on how to leverage BugBounties in the real world to up your game and make some cash. I would highly recommend this book for new and experienced penetration testers and red teamers looking to add to their arsenal.
| Best Sellers Rank | #83,627 in Books ( See Top 100 in Books ) #5 in Computer Networking (Books) #30 in Computer Hacking #43 in Computer Network Security |
| Book 3 of 3 | The Hacker Playbook |
| Customer Reviews | 4.7 4.7 out of 5 stars (1,071) |
| Dimensions | 7 x 0.66 x 10 inches |
| Edition | Signed by Peter Kim |
| ISBN-10 | 1980901759 |
| ISBN-13 | 978-1980901754 |
| Item Weight | 7.4 ounces |
| Language | English |
| Print length | 289 pages |
| Publication date | May 2, 2018 |
| Publisher | Independently published |
G**F
BUY THIS BOOK. JUST DO IT!
As good a primary resource and supplemental field book on offensive security as exists. The information is presented in as plain English as is possible and it's clear the author actually wants you to know and learn what he has in his wealth of experience. Real, hands on experience with practical examples that currently work, not just resume fluff. No cryptic talk and/or generic, old examples while withholding the good stuff, no useless buzzwords or self aggrandizement, just the good stuff, pure and simple with as little frills and distraction as possible. For the cost of a delivery pizza, you'll get a book with twice the useful content and none of the page count padding filler that you'll find with almost any of the ~$50 alternatives out there.
H**1
Great addition to the series, plenty of new material including VMs to practice!
The 3rd addition to the Hacker Playbook series did not disappoint! There was plenty of new material from the last book making the new addition definitely worth the purchase. The author included VMs to actually practice some of the techniques and exploitation methods discussed in the book. My favorite part was a vulnerable web application (included with book) that allows you to put into practice some of the newer web attacks seen today. Attacks against NodeJS templating, NoSQL Injection, more advanced XSS, XXE, deserialization and more.. The author also included some pro tips on how to leverage BugBounties in the real world to up your game and make some cash. I would highly recommend this book for new and experienced penetration testers and red teamers looking to add to their arsenal.
L**K
Great book filled with useful pen testing TTPs
This is a great book. I've spent quite a bit of time methodically working through it, keeping notes, and appreciating the Github repos that extend the value of it. Do note, this edition is more red-team oriented. With that, the focus is less on compromising a Windows domain and more so persistence and capturing/exfiltrating information. I think this is the general direction of the pen testing profession as we know it today. You could say, this book is ahead of its time in that regard.
K**S
Great book, just wish they put more effort into ...
Great book, just wish they put more effort into how to setup a VM environment properly for those who want to learn but do not. I am an IT guy but not a network admin, so NAT an bridging and which to use to stay safe when you PC is connected to the network and internet, but your vm's are not. I don't want to mistakenly open my OS's in my VM to outside internet.
F**K
PoC-focused Red Team Resource
As a red team lead, it is often challenging to find quality technical literature focused on managing and executing red team operations. Other books focus on theory or provide too high-level guidance that is not actionable (i.e. ensure you red team your cloud environment), whereas Peter Kim provides direct proof of concepts and technical guidance. This book isn't intended to cover every possible red team attack scenario, but it is an excellent resource and overview of some of the must-have tactics, tools and procedures any red team who is aiming to get to the next level of sophistication should incorporate into their baseline. Peter does an excellent job breaking down each phase of an engagement into it's own contained section. This makes it easy for red team operators to go back and reference a particular tool, as there are dedicated sections for initial setup, reconnaissance, web app, etc. Lastly, I have to compliment Peter's ability to engage his audience. The book incorporates internet-accessible web/network challenges. This is great if you don't have a handy lab to test the discovery tools and attacks out against. This extra attention to detail further enables readers to grasp concepts by actually executing a simulated attack.
H**R
The Master Magician's Guide to Pen Testing! Notebook style...hands-on strategies, tools, labs and instructions! Tips & Tricks!
Need a hands-on practical step-by-step strategies...tools...labs...instructions...Tips & Tricks?! Well, this series of books has it all and is for YOU! Version 3 has arrived...so, roll up your sleeves and get ready to dive right into the depths and heart of pentesting with Peter Kim as your guide! Each page is packed with references, tools and step by step actionable instructions that open up door after door of knowledge to widen your perspective and deepen your knowledge. After reading just a few pages...I spent another several hours going through the links provided, installing tools, exploring the tools, and understanding lab setups. Then, on to the next set of few pages. This book is densely packed and small doses will take you a long way. However, the notebook style material is very clearly organized in specific phases so you don't got lost down the rabbit hole of Pentesting Wonderland. The explanations are well-written and straight to the point. So get busy and enjoy this book! Thank you, Peter! Excellent work!
G**I
Interesting so far :) !..
I'm not really a computer whiz, but I found this book pop up on amazon and showed some interest...I guess I've just got interest in the "bad-boys gone good" in life :) I can read a page at a time, and get general information, though he does go into some detail, I think. He claims to not be a writer, but its produced in such a way that's fine to read. Its not all "algorithms" or "numbers", its paragraph format with some examples thrown about. This book is as the disclaimer author says (paraphrased), good-guy-hackers. Don't do this illegally, or you'll get in trouble...but if your helping your own company out, here's how to do it...gosh I hope I'm remembering the authors note right XD
J**S
Excelent!
Thanks!
G**P
Super relevante para quem é da area de cyber
J**R
Este libro, "The Hacker Playbook 3", es una joya para aquellos que buscan sumergirse en el fascinante mundo de la ciberseguridad y la prueba de penetración. Lo que hace que este libro destaque es su enfoque práctico y orientado a la acción. Desde el principio, el autor ofrece una perspectiva única y valiosa sobre las técnicas y herramientas esenciales para llevar a cabo pruebas de penetración de manera efectiva. Lo que realmente aprecio es la forma en que el autor presenta casos de estudio del mundo real, proporcionando escenarios prácticos que ilustran los conceptos discutidos. Esta conexión entre la teoría y la práctica hace que la información sea accesible incluso para aquellos que están dando sus primeros pasos en el campo de la seguridad informática. Además, la estructura del libro es clara y bien organizada, lo que facilita el seguimiento y la asimilación de la información. Desde la planificación de una prueba de penetración hasta la ejecución y el análisis de resultados, cada fase se aborda de manera exhaustiva. En resumen, "The Hacker Playbook 3" es más que un libro; es una herramienta esencial para aquellos que buscan entender y mejorar sus habilidades en el campo de la ciberseguridad. Este libro ha encontrado un lugar destacado en mi estantería, y lo recomiendo encarecidamente a todos aquellos que estén interesados en el emocionante y siempre cambiante mundo de la seguridad informática.
M**D
Thank you
A**E
Une pépite !
J**H
I've been reading the book for a while and just finished the discovery section. So far I'm pleased with the content of the book, it can sometimes be a little light on description and instructions, but overall it's very informative and the tools that are described within are very useful. It's one of the better books I've read about pen testing, I'd give it a 4.5/5 and definitely recommend it to people who have a decent understanding of computers and security but are light on practical knowledge and experience of pen testing.
Trustpilot
Hace 2 meses
Hace 2 semanas