The Hacker Playbook 2: Practical Guide To Penetration Testing,Used

The Hacker Playbook 2: Practical Guide To Penetration Testing,Used

SKU: SONG1512214566 In Stock
Sale price$8.94 Regular price$12.77
Save $3.83
Quantity
Add to wishlist
Add to compare
Shipping & Tax will be calculated at Checkout.
Delivery time: 3-5 business days (USA)
Delivery time: 8-12 business days (International)
15 days return policy
Payment Options

Help

If you have any questions, you are always welcome to contact us. We'll get back to you as soon as possible, withing 24 hours on weekdays.

Customer service

All questions about your order, return and delivery must be sent to our customer service team by e-mail at yourstore@yourdomain.com

Sale & Press

If you are interested in selling our products, need more information about our brand or wish to make a collaboration, please contact us at press@yourdomain.com

Customer Reviews

Be the first to write a review
0%
(0)
0%
(0)
0%
(0)
0%
(0)
0%
(0)

Just as a professional athlete doesnt show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this stepbystep guide to the game of penetration hacking features handson examples and helpful advice from the top of the field.Through a series of footballstyle plays, this straightforward guide gets to the root of many of the roadblocks people may face while penetration testingincluding attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software.From Pregame research to The Drive and The Lateral Pass, the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.This second version of The Hacker Playbook takes all the best 'plays' from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.Whether youre downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hackers libraryso theres no reason not to get in the game.

Shipping & Returns

Shipping
We ship your order within 2–3 business days for USA deliveries and 5–8 business days for international shipments. Once your package has been dispatched from our warehouse, you'll receive an email confirmation with a tracking number, allowing you to track the status of your delivery.

Returns
To facilitate a smooth return process, a Return Authorization (RA) Number is required for all returns. Returns without a valid RA number will be declined and may incur additional fees. You can request an RA number within 15 days of the original delivery date. For more details, please refer to our Return & Refund Policy page.

Shipping & Returns

Shipping
We ship your order within 2–3 business days for USA deliveries and 5–8 business days for international shipments. Once your package has been dispatched from our warehouse, you'll receive an email confirmation with a tracking number, allowing you to track the status of your delivery.

Returns
To facilitate a smooth return process, a Return Authorization (RA) Number is required for all returns. Returns without a valid RA number will be declined and may incur additional fees. You can request an RA number within 15 days of the original delivery date. For more details, please refer to our Return & Refund Policy page.

Warranty

We provide a 2-year limited warranty, from the date of purchase for all our products.

If you believe you have received a defective product, or are experiencing any problems with your product, please contact us.

This warranty strictly does not cover damages that arose from negligence, misuse, wear and tear, or not in accordance with product instructions (dropping the product, etc.).

Warranty

We provide a 2-year limited warranty, from the date of purchase for all our products.

If you believe you have received a defective product, or are experiencing any problems with your product, please contact us.

This warranty strictly does not cover damages that arose from negligence, misuse, wear and tear, or not in accordance with product instructions (dropping the product, etc.).

Secure Payment

Your payment information is processed securely. We do not store credit card details nor have access to your credit card information.

We accept payments with :
Visa, MasterCard, American Express, Paypal, Shopify Payments, Shop Pay and more.

Secure Payment

Your payment information is processed securely. We do not store credit card details nor have access to your credit card information.

We accept payments with :
Visa, MasterCard, American Express, Paypal, Shopify Payments, Shop Pay and more.

Related Products

You may also like

Frequently Asked Questions

  • Q: What topics are covered in The Hacker Playbook 2? A: The Hacker Playbook 2 covers essential topics for penetration testing, including attacking different types of networks, privilege escalation, evading antivirus software, and more. It offers practical 'plays' that guide readers through various scenarios faced during penetration tests.
  • Q: Who is the author of The Hacker Playbook 2? A: The author of The Hacker Playbook 2 is Peter Kim, a seasoned security professional and the CEO of Secure Planet, LLC.
  • Q: What is the page count of The Hacker Playbook 2? A: The Hacker Playbook 2 consists of 358 pages, providing comprehensive coverage of penetration testing techniques.
  • Q: Is The Hacker Playbook 2 suitable for beginners? A: Yes, The Hacker Playbook 2 is suitable for readers of all experience levels, including beginners. It provides step-by-step guidance and practical examples to help new ethical hackers understand the basics.
  • Q: What format is The Hacker Playbook 2 available in? A: The Hacker Playbook 2 is available in paperback format, making it accessible for readers who prefer physical books.
  • Q: When was The Hacker Playbook 2 published? A: The Hacker Playbook 2 was published on June 20, 2015.
  • Q: Does The Hacker Playbook 2 include updated information? A: Yes, The Hacker Playbook 2 includes updated information on the latest attacks, tools, and lessons learned since the original book, providing readers with current and relevant content.
  • Q: Can The Hacker Playbook 2 help with preparing for a job in IT security? A: Absolutely. The practical advice and techniques outlined in The Hacker Playbook 2 are beneficial for anyone preparing for a career in IT security, helping build foundational skills needed in the field.
  • Q: Are there hands-on examples in The Hacker Playbook 2? A: Yes, The Hacker Playbook 2 features hands-on examples that allow readers to apply the concepts learned and gain practical experience in penetration testing.
  • Q: What makes The Hacker Playbook 2 different from the first edition? A: The Hacker Playbook 2 incorporates double the content compared to its predecessor, featuring enhanced guidance on building labs, test cases for attacks, and more customized code.