000 03261nam a22003497a 4500
005 20230526220326.0
008 210824s2018 xx a|||| |||| 00| 0 eng d
020 _a9781980901754
_qpaperback
040 _aEG-CaTKH
_beng
_cEG-CaTKH
_erda
050 _aQA76.9.A25
_bK56 2018
082 0 0 _a005.8 KI.H 2018
_223
100 1 _aKim, Peter,
_eauthor.
245 1 0 _aThe hacker playbook 3 :
_bPractical guide to penetration testing /
_cPeter Kim.
250 _aFirst edition.
264 1 _a[place of publication not identified] :
_bSecure Planet LLC,
_c2018.
300 _aix, 271 pages :
_billustrations ;
_c26 cm.
336 _2rdacontent
_atext
_btxt
337 _2rdamedia
_aunmediated
_bn
338 _2rdacarrier
_avolume
_bnc
500 _a
505 0 _aIntroduction -- Pregame : the setup -- Before the snap : red team recon -- The throw : web application exploitation -- The drive : compromising the network -- The screen : social engineering -- The onside kick : physical attacks -- The quarterback sneak : evading AV and network detection -- Special teams : cracking, exploits, and tricks -- Two-minute drill : from zero to hero.
520 _a"Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. With a combination of new strategies, attacks, exploits, tips and tricks, you will be able to put yourself in the center of the action toward victory. The main purpose of this book is to answer questions as to why things are still broken. For instance, with all the different security products, secure code reviews, defense in depth, and penetration testing requirements, how are we still seeing massive security breaches happening to major corporations and governments? The real question we need to ask ourselves is, are all the safeguards we are putting in place working? This is what The Hacker Playbook 3 - Red Team Edition is all about. By now, we are all familiar with penetration testing, but what exactly is a Red Team? Red Teams simulate real-world, advanced attacks to test how well your organization's defensive teams respond if you were breached. They find the answers to questions like: Do your incident response teams have the right tools, skill sets, and people to detect and mitigate these attacks? How long would it take them to perform these tasks and is it adequate? This is where you, as a Red Teamer, come in to accurately test and validate the overall security program. THP3 will take your offensive hacking skills, thought processes, and attack paths to the next level. This book focuses on real-world campaigns and attacks, exposing you to different initial entry points, exploitation, custom malware, persistence, and lateral movement--all without getting caught! This heavily lab-based book will include multiple Virtual Machines, testing environments, and custom THP tools."--Provided by publisher.
650 0 _aPenetration testing (Computer security)
_xHandbooks, manuals, etc.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aComputer software
_xTesting.
650 0 _aComputer crimes
_xPrevention.
650 0 _aHackers.
650 0 _aComputer programming.
942 _2ddc
_cBK
998 _ahuda.mahmoud
_bM
_d2022026
998 _amona.romia
_bR
_d20220207
999 _c881
_d881