Books: Difference between revisions
Tag: Undo |
Add a few new books, provide synopsis for existing and new books, update links as appropriate. |
||
| Line 4: | Line 4: | ||
=== B === | === B === | ||
[https://www.amazon.com/Blue-Team-Field-Manual-BTFM/dp/154101636X/ Blue Team Field Manual (BTFM)] | [https://www.amazon.com/Blue-Team-Field-Manual-BTFM/dp/154101636X/ Blue Team Field Manual (BTFM)] - A Cybersecurity Incident Response Guide that aligns with the NIST Cybersecurity Framework | ||
=== C === | === C === | ||
[https://github.com/opsdisk/the_cyber_plumbers_handbook/ The Cyber Plumber's Handbook] - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss, plus a purchasable [https://opsdisk.gumroad.com/l/cphlab lab guide and hands-on interactive lab] for practicing what you learn. | |||
=== D === | === D === | ||
=== E === | === E === | ||
[https://book.ethicalhackinghtb.xyz/ Ethical Hacking with Hack the Box] - An online-book guide to getting started with ethical hacking | |||
=== F === | === F === | ||
| Line 17: | Line 19: | ||
=== H === | === H === | ||
[https://www.amazon.com/Hacker-Playbook-3-Book/dp/B0883B694R/ The Hacker Playbook (3 book collection)] - A step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field. | |||
=== I === | === I === | ||
| Line 27: | Line 30: | ||
=== M === | === M === | ||
[https://www.amazon.com/Metasploit-Penetration-Testers-David-Kennedy/dp/159327288X/ Metasploit: The Penetration Tester's Guide] | [https://www.amazon.com/Metasploit-Penetration-Testers-David-Kennedy/dp/159327288X/ Metasploit: The Penetration Tester's Guide] - The authoritative guide to the [[Metasploit|Metasploit Framework]] | ||
=== N === | === N === | ||
[https://www.amazon.com/Nmap-Network-Scanning-Official-Discovery/dp/0979958717/ Nmap Network Scanning]: The Official Nmap Project Guide to Network Discovery and Security Scanning - The definitive guide to [[nmap]], but the tool's author, Fyoder | |||
=== O === | === O === | ||
=== P === | === P === | ||
[https://www.amazon.com/Penetration-Testing-Hands-Introduction-Hacking/dp/1593275641/ Penetration Testing: A Hand-On Introduction to Hacking] | [https://www.amazon.com/Penetration-Testing-Hands-Introduction-Hacking/dp/1593275641/ Penetration Testing: A Hand-On Introduction to Hacking] - An introduction to the core skills and techniques that every pentester needs | ||
[https://www.amazon.com/Practical-Packet-Analysis-Wireshark-Real-World/dp/1593278020/ Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems] | [https://www.amazon.com/Practical-Packet-Analysis-Wireshark-Real-World/dp/1593278020/ Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems] - A guide to making sense of [[Wireshark]] packet captures, IPv6 and SMTP, plus help on the powerful command line packet analyzers [[tcpdump]] and TShark | ||
[https://www.amazon.com/PTFM-Purple-Team-Field-Manual/dp/B08LJV1QCD/ Purple Team Field Manual (PTFM)] | [https://www.amazon.com/PTFM-Purple-Team-Field-Manual/dp/B08LJV1QCD/ Purple Team Field Manual (PTFM)] - The purple team field manual is a manual for all security professionals and integrates red and blue team methodologies. | ||
=== Q === | === Q === | ||
=== R === | === R === | ||
[https://www.amazon.com/Rtfm-Red-Team-Field-Manual/dp/1494295504/ Red Team Field Manual (RTFM)] | [https://www.amazon.com/Rtfm-Red-Team-Field-Manual/dp/1494295504/ Red Team Field Manual (RTFM)] - A thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to scan through a man page | ||
=== S === | === S === | ||
| Line 54: | Line 58: | ||
=== W === | === W === | ||
[https://www.amazon.com/Wireshark-101-Essential-Analysis-Solution/dp/1893939758/ Wireshark 101: Essential Skills for Network Analysis - 2nd Edition] | [https://www.amazon.com/Wireshark-101-Essential-Analysis-Solution/dp/1893939758/ Wireshark 101: Essential Skills for Network Analysis - 2nd Edition] - Step-by-step instructions on the key functions and features of Wireshark | ||
=== X === | === X === | ||
Revision as of 04:36, 26 October 2021
A non-exhaustive list of books covering a broad range of subjects which will interest security learners and practitioners.
A
B
Blue Team Field Manual (BTFM) - A Cybersecurity Incident Response Guide that aligns with the NIST Cybersecurity Framework
C
The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss, plus a purchasable lab guide and hands-on interactive lab for practicing what you learn.
D
E
Ethical Hacking with Hack the Box - An online-book guide to getting started with ethical hacking
F
G
H
The Hacker Playbook (3 book collection) - A step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.
I
J
K
L
M
Metasploit: The Penetration Tester's Guide - The authoritative guide to the Metasploit Framework
N
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning - The definitive guide to nmap, but the tool's author, Fyoder
O
P
Penetration Testing: A Hand-On Introduction to Hacking - An introduction to the core skills and techniques that every pentester needs
Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems - A guide to making sense of Wireshark packet captures, IPv6 and SMTP, plus help on the powerful command line packet analyzers tcpdump and TShark
Purple Team Field Manual (PTFM) - The purple team field manual is a manual for all security professionals and integrates red and blue team methodologies.
Q
R
Red Team Field Manual (RTFM) - A thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to scan through a man page
S
T
U
V
W
Wireshark 101: Essential Skills for Network Analysis - 2nd Edition - Step-by-step instructions on the key functions and features of Wireshark
