Books

From SecurityTools
Revision as of 04:36, 26 October 2021 by RagManX (talk | contribs) (Add a few new books, provide synopsis for existing and new books, update links as appropriate.)

A non-exhaustive list of books covering a broad range of subjects which will interest security learners and practitioners.

A

B

Blue Team Field Manual (BTFM) - A Cybersecurity Incident Response Guide that aligns with the NIST Cybersecurity Framework

C

The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss, plus a purchasable lab guide and hands-on interactive lab for practicing what you learn.

D

E

Ethical Hacking with Hack the Box - An online-book guide to getting started with ethical hacking

F

G

H

The Hacker Playbook (3 book collection) - A step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.

I

J

K

L

M

Metasploit: The Penetration Tester's Guide - The authoritative guide to the Metasploit Framework

N

Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning - The definitive guide to nmap, but the tool's author, Fyoder

O

P

Penetration Testing: A Hand-On Introduction to Hacking - An introduction to the core skills and techniques that every pentester needs

Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems - A guide to making sense of Wireshark packet captures, IPv6 and SMTP, plus help on the powerful command line packet analyzers tcpdump and TShark

Purple Team Field Manual (PTFM) - The purple team field manual is a manual for all security professionals and integrates red and blue team methodologies.

Q

R

Red Team Field Manual (RTFM) - A thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to scan through a man page

S

T

U

V

W

Wireshark 101: Essential Skills for Network Analysis - 2nd Edition - Step-by-step instructions on the key functions and features of Wireshark

X

Y

Z