Hackers Handbook Series and Penetration Testing Books
Oleh
chmood
Books
Β§ The Art of Exploitation by Jon Erickson, 2008
Β§ Metasploit: The Penetration Testerβs Guide by David Kennedy and others, 2011
Β§ Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014
Β§ Rtfm: Red Team Field Manual by Ben Clark, 2014
Β§ The Hacker Playbook by Peter Kim, 2014
Β§ The Basics of Hacking and Penetration Testing by Patrick Engebretson, 2013
Β§ Professional Penetration Testing by Thomas Wilhelm, 2013
Β§ Advanced Penetration Testing for Highly-Secured Environments by Lee Allen,2012
Β§ Violent Python by TJ OβConnor, 2012
Β§ Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton, Adam Greene, Pedram Amini, 2007
Β§ Black Hat Python: Python Programming for Hackers and Pentesters, 2014
Β§ Penetration Testing: Procedures & Methodologies (EC-Council Press),2010
Hackers Handbook Series
Β§ The Shellcoders Handbook by Chris Anley and others, 2007
Β§ The Web Application Hackers Handbook by D. Stuttard, M. Pinto, 2011
Β§ iOS Hackers Handbook by Charlie Miller and others, 2012
Β§ Android Hackers Handbook by Joshua J. Drake and others, 2014
Β§ The Browser Hackers Handbook by Wade Alcorn and others, 2014
Β§ The Mobile Application Hackers Handbook by Dominic Chell and others, 2015
Network Analysis Books
Β§ Nmap Network Scanning by Gordon Fyodor Lyon, 2009
Β§ Practical Packet Analysis by Chris Sanders, 2011
Β§ Wireshark Network Analysis by by Laura Chappell, Gerald Combs, 2012
Reverse Engineering Books
Β§ Reverse Engineering for Beginners by Dennis Yurichev (free!)
Β§ The IDA Pro Book by Chris Eagle, 2011
Β§ Practical Reverse Engineering by Bruce Dang and others, 2014
Β§ Reverse Engineering for Beginners
Malware Analysis Books
Β§ Practical Malware Analysis by Michael Sikorski, Andrew Honig, 2012
Β§ The Art of Memory Forensics by Michael Hale Ligh and others, 2014
Β§ Malware Analystβs Cookbook and DVD by Michael Hale Ligh and others, 2010
Windows Books
Β§ Windows Internals by Mark Russinovich, David Solomon, Alex Ionescu
Social Engineering Books
Β§ The Art of Deception by Kevin D. Mitnick, William L. Simon, 2002
Β§ The Art of Intrusion by Kevin D. Mitnick, William L. Simon, 2005
Β§ Ghost in the Wires by Kevin D. Mitnick, William L. Simon, 2011
Β§ No Tech Hacking by Johnny Long, Jack Wiles, 2008
Β§ Social Engineering: The Art of Human Hacking by Christopher Hadnagy, 2010
Β§ Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014
Β§ Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady, 2014
Lock Picking Books
Β§ Practical Lock Picking by Deviant Ollam, 2012
Β§ Keys to the Kingdom by Deviant Ollam, 2012
Β§ CIA Lock Picking Field Operative Training Manual
Β§ Lock Picking: Detail Overkill by Solomon
Β§ Eddie the Wire books
Vulnerability Databases
Β§ NVD β US National Vulnerability Database
Β§ CERT β US Computer Emergency Readiness Team
Β§ OSVDB β Open Sourced Vulnerability Database
Β§ Bugtraq β Symantec SecurityFocus
Β§ Exploit-DB β Offensive Security Exploit Database
Β§ Fulldisclosure β Full Disclosure Mailing List
Β§ MS Bulletin β Microsoft Security Bulletin
Β§ MS Advisory β Microsoft Security Advisories
Β§ Inj3ct0r β Inj3ct0r Exploit Database
Β§ Packet Storm β Packet Storm Global Security Resource
Β§ SecuriTeam β Securiteam Vulnerability Information
Β§ CXSecurity β CSSecurity Bugtraq List
Β§ Vulnerability Laboratory β Vulnerability Research Laboratory
Β§ ZDI β Zero Day Initiative
Β§ The Art of Exploitation by Jon Erickson, 2008
Β§ Metasploit: The Penetration Testerβs Guide by David Kennedy and others, 2011
Β§ Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014
Β§ Rtfm: Red Team Field Manual by Ben Clark, 2014
Β§ The Hacker Playbook by Peter Kim, 2014
Β§ The Basics of Hacking and Penetration Testing by Patrick Engebretson, 2013
Β§ Professional Penetration Testing by Thomas Wilhelm, 2013
Β§ Advanced Penetration Testing for Highly-Secured Environments by Lee Allen,2012
Β§ Violent Python by TJ OβConnor, 2012
Β§ Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton, Adam Greene, Pedram Amini, 2007
Β§ Black Hat Python: Python Programming for Hackers and Pentesters, 2014
Β§ Penetration Testing: Procedures & Methodologies (EC-Council Press),2010
Hackers Handbook Series
Β§ The Shellcoders Handbook by Chris Anley and others, 2007
Β§ The Web Application Hackers Handbook by D. Stuttard, M. Pinto, 2011
Β§ iOS Hackers Handbook by Charlie Miller and others, 2012
Β§ Android Hackers Handbook by Joshua J. Drake and others, 2014
Β§ The Browser Hackers Handbook by Wade Alcorn and others, 2014
Β§ The Mobile Application Hackers Handbook by Dominic Chell and others, 2015
Network Analysis Books
Β§ Nmap Network Scanning by Gordon Fyodor Lyon, 2009
Β§ Practical Packet Analysis by Chris Sanders, 2011
Β§ Wireshark Network Analysis by by Laura Chappell, Gerald Combs, 2012
Reverse Engineering Books
Β§ Reverse Engineering for Beginners by Dennis Yurichev (free!)
Β§ The IDA Pro Book by Chris Eagle, 2011
Β§ Practical Reverse Engineering by Bruce Dang and others, 2014
Β§ Reverse Engineering for Beginners
Malware Analysis Books
Β§ Practical Malware Analysis by Michael Sikorski, Andrew Honig, 2012
Β§ The Art of Memory Forensics by Michael Hale Ligh and others, 2014
Β§ Malware Analystβs Cookbook and DVD by Michael Hale Ligh and others, 2010
Windows Books
Β§ Windows Internals by Mark Russinovich, David Solomon, Alex Ionescu
Social Engineering Books
Β§ The Art of Deception by Kevin D. Mitnick, William L. Simon, 2002
Β§ The Art of Intrusion by Kevin D. Mitnick, William L. Simon, 2005
Β§ Ghost in the Wires by Kevin D. Mitnick, William L. Simon, 2011
Β§ No Tech Hacking by Johnny Long, Jack Wiles, 2008
Β§ Social Engineering: The Art of Human Hacking by Christopher Hadnagy, 2010
Β§ Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014
Β§ Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady, 2014
Lock Picking Books
Β§ Practical Lock Picking by Deviant Ollam, 2012
Β§ Keys to the Kingdom by Deviant Ollam, 2012
Β§ CIA Lock Picking Field Operative Training Manual
Β§ Lock Picking: Detail Overkill by Solomon
Β§ Eddie the Wire books
Vulnerability Databases
Β§ NVD β US National Vulnerability Database
Β§ CERT β US Computer Emergency Readiness Team
Β§ OSVDB β Open Sourced Vulnerability Database
Β§ Bugtraq β Symantec SecurityFocus
Β§ Exploit-DB β Offensive Security Exploit Database
Β§ Fulldisclosure β Full Disclosure Mailing List
Β§ MS Bulletin β Microsoft Security Bulletin
Β§ MS Advisory β Microsoft Security Advisories
Β§ Inj3ct0r β Inj3ct0r Exploit Database
Β§ Packet Storm β Packet Storm Global Security Resource
Β§ SecuriTeam β Securiteam Vulnerability Information
Β§ CXSecurity β CSSecurity Bugtraq List
Β§ Vulnerability Laboratory β Vulnerability Research Laboratory
Β§ ZDI β Zero Day Initiative
Category
Komentar