The Hacker Playbook 3: Practical Guide To Penetration Testing

The Hacker Playbook 3: Practical Guide To Penetration Testing pdf

Autor:

Peter Kim

Puntos de vista:

2594

Idioma:

Inglés

Clasificación:

3.0

Departamento:

tecnología

Número de páginas:

337

Sección:

hackear

Tamaño del archivo:

9137015 MB

calidad del libro :

Bueno

descargar un libro:

128

Notificación

Debido a la actualización del sitio, la descarga se detendrá temporalmente hasta que se complete la actualización. [email protected]

Peter Kim ha estado en la industria de la seguridad de la información durante más de 14 años y ha estado dirigiendo Equipos Rojos / Pruebas de Penetración durante más de 12 años. Ha trabajado para varias empresas de servicios públicos, empresas de entretenimiento Fortune 1000, agencias gubernamentales y grandes organizaciones financieras. Aunque es más conocido por la serie The Hacker Playbook, su pasión es construir una comunidad de seguridad segura, asesorar a los estudiantes y capacitar a otros. Fundó y mantiene uno de los clubes de seguridad técnica más grandes del sur de California llamado LETHAL (www.meetup.com/LETHAL), realiza capacitación privada en su almacén LETHAL Security (lethalsecurity.com) y dirige una empresa boutique de pruebas de penetración llamada Secure Planet (www .SecurePla.net). El objetivo principal de Peter con la serie The Hacker Playbook es inculcar pasión a sus lectores y hacer que piensen fuera de la caja. Con el entorno de seguridad en constante cambio, quiere ayudar a construir la próxima generación de profesionales de la seguridad.

Descripción del libro

The Hacker Playbook 3: Practical Guide To Penetration Testing pdf por Peter Kim

Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. With a combination of new strategies, attacks, exploits, tips and tricks, you will be able to put yourself in the center of the action toward victory. The main purpose of this book is to answer questions as to why things are still broken. For instance, with all the different security products, secure code reviews, defense in depth, and penetration testing requirements, how are we still seeing massive security breaches happening to major corporations and governments? The real question we need to ask ourselves is, are all the safeguards we are putting in place working? This is what The Hacker Playbook 3 - Red Team Edition is all about. By now, we are all familiar with penetration testing, but what exactly is a Red Team? Red Teams simulate real-world, advanced attacks to test how well your organization's defensive teams respond if you were breached. They find the answers to questions like: Do your incident response teams have the right tools, skill sets, and people to detect and mitigate these attacks? How long would it take them to perform these tasks and is it adequate? This is where you, as a Red Teamer, come in to accurately test and validate the overall security program. THP3 will take your offensive hacking skills, thought processes, and attack paths to the next level. This book focuses on real-world campaigns and attacks, exposing you to different initial entry points, exploitation, custom malware, persistence, and lateral movement--all without getting caught! This heavily lab-based book will include multiple Virtual Machines, testing environments, and custom THP tools.

Reseña del libro

3.0

out of

5 stars

0

0

1

0

0

Book Quotes

Top rated
Latest
Quote
there are not any quotes

there are not any quotes

Más libros Peter Kim

The Hacker Playbook Practical Guide To Penetration Testing
The Hacker Playbook Practical Guide To Penetration Testing
hackear
3.0000
2619
English
Peter Kim
The Hacker Playbook Practical Guide To Penetration Testing pdf por Peter Kim
The Hacker Playbook 2: Practical Guide To Penetration Testing
The Hacker Playbook 2: Practical Guide To Penetration Testing
hackear
5743
English
Peter Kim
The Hacker Playbook 2: Practical Guide To Penetration Testing pdf por Peter Kim

Más libros hackear

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
2654
English
Kevin Mitnick
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers pdf por Kevin Mitnick
The art of deception: controlling the human element of security
The art of deception: controlling the human element of security
3055
English
Kevin Mitnick
The art of deception: controlling the human element of security pdf por Kevin Mitnick
No tech hacking: A guide to social engineering, dumpster diving, and shoulder surfing
No tech hacking: A guide to social engineering, dumpster diving, and shoulder surfing
1950
English
Kevin Mitnick
No tech hacking: A guide to social engineering, dumpster diving, and shoulder surfing pdf por Kevin Mitnick
Hardware Hacking: Have Fun While Voiding Your Warranty
Hardware Hacking: Have Fun While Voiding Your Warranty
2579
English
Kevin Mitnick
Hardware Hacking: Have Fun While Voiding Your Warranty pdf por Kevin Mitnick

Add Comment

Authentication required

You must log in to post a comment.

Log in
There are no comments yet.