Hackers Handbook Series and Penetration Testing Books

chmood
Books

Β§ The Art of Exploitation by Jon Erickson, 2008
Β§ Metasploit: The Penetration Tester’s Guide by David Kennedy and others, 2011
Β§ Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014
Β§ Rtfm: Red Team Field Manual by Ben Clark, 2014
Β§ The Hacker Playbook by Peter Kim, 2014
Β§ The Basics of Hacking and Penetration Testing by Patrick Engebretson, 2013
Β§ Professional Penetration Testing by Thomas Wilhelm, 2013
Β§ Advanced Penetration Testing for Highly-Secured Environments by Lee Allen,2012
Β§ Violent Python by TJ O’Connor, 2012
Β§ Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton, Adam Greene, Pedram Amini, 2007
Β§ Black Hat Python: Python Programming for Hackers and Pentesters, 2014
Β§ Penetration Testing: Procedures & Methodologies (EC-Council Press),2010


Hackers Handbook Series


Β§ The Shellcoders Handbook by Chris Anley and others, 2007
Β§ The Web Application Hackers Handbook by D. Stuttard, M. Pinto, 2011
Β§ iOS Hackers Handbook by Charlie Miller and others, 2012
Β§ Android Hackers Handbook by Joshua J. Drake and others, 2014
Β§ The Browser Hackers Handbook by Wade Alcorn and others, 2014
Β§ The Mobile Application Hackers Handbook by Dominic Chell and others, 2015


Network Analysis Books


Β§ Nmap Network Scanning by Gordon Fyodor Lyon, 2009
Β§ Practical Packet Analysis by Chris Sanders, 2011
Β§ Wireshark Network Analysis by by Laura Chappell, Gerald Combs, 2012


Reverse Engineering Books


Β§ Reverse Engineering for Beginners by Dennis Yurichev (free!)
Β§ The IDA Pro Book by Chris Eagle, 2011
Β§ Practical Reverse Engineering by Bruce Dang and others, 2014
Β§ Reverse Engineering for Beginners


Malware Analysis Books



Β§ Practical Malware Analysis by Michael Sikorski, Andrew Honig, 2012
Β§ The Art of Memory Forensics by Michael Hale Ligh and others, 2014
Β§ Malware Analyst’s Cookbook and DVD by Michael Hale Ligh and others, 2010


Windows Books


Β§ Windows Internals by Mark Russinovich, David Solomon, Alex Ionescu


Social Engineering Books


Β§ The Art of Deception by Kevin D. Mitnick, William L. Simon, 2002
Β§ The Art of Intrusion by Kevin D. Mitnick, William L. Simon, 2005
Β§ Ghost in the Wires by Kevin D. Mitnick, William L. Simon, 2011
Β§ No Tech Hacking by Johnny Long, Jack Wiles, 2008
Β§ Social Engineering: The Art of Human Hacking by Christopher Hadnagy, 2010
Β§ Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014
Β§ Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady, 2014

Lock Picking Books



Β§ Practical Lock Picking by Deviant Ollam, 2012
Β§ Keys to the Kingdom by Deviant Ollam, 2012
Β§ CIA Lock Picking Field Operative Training Manual
Β§ Lock Picking: Detail Overkill by Solomon
Β§ Eddie the Wire books







Vulnerability Databases


Β§ NVD – US National Vulnerability Database
Β§ CERT – US Computer Emergency Readiness Team
Β§ OSVDB – Open Sourced Vulnerability Database
Β§ Bugtraq – Symantec SecurityFocus
Β§ Exploit-DB – Offensive Security Exploit Database
Β§ Fulldisclosure – Full Disclosure Mailing List
Β§ MS Bulletin – Microsoft Security Bulletin
Β§ MS Advisory – Microsoft Security Advisories
Β§ Inj3ct0r – Inj3ct0r Exploit Database
Β§ Packet Storm – Packet Storm Global Security Resource
Β§ SecuriTeam – Securiteam Vulnerability Information
Β§ CXSecurity – CSSecurity Bugtraq List
Β§ Vulnerability Laboratory – Vulnerability Research Laboratory
Β§ ZDI – Zero Day Initiative


Komentar