
The Hacker Playbook 2: Practical Guide To Penetration
by Peter Kim
The second installment of The Hacker Playbook series updates and expands the penetration testing methodology with new techniques, tools, and attack vectors. Peter Kim covers the evolution of defensive security and how offensive techniques have adapted, introducing advanced topics like pivoting through networks, bypassing antivirus and endpoint detection, attacking Active Directory environments, and using PowerShell for post-exploitation. The book adds new plays for web application attacks, social engineering campaigns, and physical security assessments. It maintains the practical, hands-on approach of the first book while pushing into more sophisticated territory, making it suitable for practitioners who have mastered the basics and want to level up their red team capabilities.
Available formats
Book Details
- Author
- Peter Kim
- Year
- 2015
- Category
- Penetration Testing
- ISBN
- 978-1512214567
- Formats
- Paperback, Kindle
Related Books
Penetration Testing: A Hands-On Introduction to Hacking
Georgia Weidman
Hands-on introduction to pentesting covering Kali Linux, Metasploit, social engineering, and reporting.
The Hacker Playbook: Practical Guide To Penetration Testing
Peter Kim
The Hacker Playbook provides a practical, step-by-step guide to penetration testing methodology. Peter Kim draws on his experience as a security consultant to walk readers through the phases of a.
The Hacker Playbook 3: Practical Guide To Penetration Testing
Peter Kim
The Hacker Playbook 3 shifts focus from traditional penetration testing to red team operations, reflecting the industry's evolution toward adversary simulation. Peter Kim introduces the concept of.