Peter Kim
More books by Peter Kim…
“Take a full clean snapshot of your working VMs and let’s start discovering and attacking networks. Before you run any plays, you have to know and analyze your opponent. Studying the target for weaknesses and understanding the environment will provide huge payoffs. This chapter will take a look at scanning from a slightly different aspect than the normal penetration testing books and should be seen as an additive to your current scanning processes, not as a replacement.”
― The Hacker Playbook: Practical Guide to Penetration Testing
― The Hacker Playbook: Practical Guide to Penetration Testing
Is this you? Let us know. If not, help out and invite Peter to Goodreads.



















