Full description not available
E**O
Good book for practical approach
I gave to my son this book because he will study in the university informatics with option in cybersecurity. It has a good approach and simple explanations to use with Kali Linux and It got the interest of my son.I think that it has a good written with compact explanations for security IT terms and if you do a lab with equipments in a small LAN this will be a good book for everyone that feels passion for cybersecurity. Only a bad situation is the paper that it is similar to a copy in low resolution but I think this one is about the low price. The author has good approach for a young student.
C**N
The book ROCKS i get like 5, and this one
The book ROCKS i get like 5 , and this one . Have good data.More than the CODES or tools this book give a way of thinking very interesting.You will never be the same after you red this.Is hard to belive this info is public just for some bucks.You can feel the autor in each line , he love github and use code , easy to start.He say this book is not for beginers but i belive this book is a godd book even if you are not interested in computers but you learn how easy the sistem can get down.This is one of the best books i ever get....and i use many triks to make safe my sites like fraguas.com.ar
G**F
"Blade" does it again... 5/5
Security professional with 5-6 years of high level incident response and threat intel work here. These (THPB 1 and 2) are my go to books for pen testing / offsec. I like Kim's writing style and approach to covering the topics so I always pick up these books at some point. It's a nice and easy light read but has enough technical info and insight by the author to be useful to any information security professional from day onward. It's also worth noting that the author is actively engaged in the security community and working as a very successful penetration tester. Between that and updating the corresponding website ([...]) it's a good value.At the price of less than a pizza delivery and generally in the list of my top 10 security books/series, it's an easy choice to pick these up.
J**O
Content is 5 stars, physical book is 4
I'm torn on how to rate this book. I've only had it for a day, but I think the content is awesome. There is a ton of information to learn from, and I especially like the info on how to set up pentest boxes. However, I'm very disappointed in the physical book itself. It looks like it was printed in someone's basement, on a low end laser printer that was running out of toner! Many of the section headers have lots of white running through the black text - not sure if that is intentionally done or not, but it's not a good look. I also have to say that the binding and gluing is poorly done - glue oozing out and making it hard to turn the pages.So, 5 stars for content, 1 star for the physical presentation of the book.Edit: After seeing my review, the author contacted me and offered to send me a new copy of the book. The new book arrived and is in much better physical condition. The gluing is much better - no glue oozing out, making it easy to actually turn the pages. The print is similar to my original copy, so I'm assuming that it's supposed to be that way. I'm not crazy about the font, but I can deal with it. Now, 5 stars for content, 4 stars for the physical presentation of the book.
L**K
This book was a great sequel to the first Hacker Playbook
This book was a great sequel to the first Hacker Playbook. I've always enjoyed how the methods that are presented in this book stray away from simple penetration testing methodology into more targeted and smart hacking, with varying emphasis on how loud or silent to be in an engagement. Furthermore, the tools presented in this book as alternatives to the industry standard (e.x, Masscan as opposed to Nmap), are all tools I now include in my arsenal for engagements. Plus, instead of just looking at the same methods of attacking machines and different computing technologies, there are relevant vulnerabilities that are illustrated from an entire year of security research from various hackers (Heartbleed, Shellshock, etc.), making the skills you can acquire from this book relevant to the things you would normally see deployed in today's environment. Most noticeably, the practical approach to this book, the setup of a legitimate testing environment, and illustrated examples of techniques that are based off of real engagements make this book a must have for beginners and experts alike. All in all, 10 out of 10. I highly recommend purchasing this book if you are a penetration tester or looking to get into the security field.
P**N
Essential Resource for your Info Sec Library
If someone asked you to design the perfect textbook for penetration testers with intelligent tutorials, screenshots, explanations, simulations, resources, and a comprehensive layout and design, you would get The Hacker Playbook 2 by Peter Kim. For those of us who are continually learning, researching and honing our skills, this is THE book for you. It's up to date, current, and applicable for study for penetration testers at any level. I highly recommend The Hacker Playbook 2 be an essential book in your Info Sec library.
M**T
Good read
Initially started reading the 3rd book (playbook 3) in this series and quickly found him referring to things discussed in this book ( playbook 2) so I decided to read this book first before getting too deep into playbook 3. This is a good read for people wanting to get into hacking/pen testing. This will give you a good baseline to start with if you are just getting started in the field.
Trustpilot
Hace 4 días
Hace 1 semana