Jump to ratings and reviews
Rate this book

Hacking - Guide pratique des tests d'intrusion

Rate this book
Le livre indispensable pour contourner et éradiquer les attaques des hackers et sécuriser tous vos systèmes informatiques

Pour combattre un pirate, il faut penser comme un pirate et connaître toutes leurs pratiques. L'expert Peter Kim vous explique les motivations et les objectifs des hackers. Il vous révèle les secrets des tests de vulnérabilité et de pénétration, des meilleures pratiques et de tout ce qu'il faut connaître pour neutraliser les pirates avant qu'ils aient pu commettre des dégâts. Découvrez comment protéger vos serveurs et vos postes de travail, vos applications web, vos appareils mobiles et tous vos réseaux.
Ce livre est illustré par des exemples d'attaques réelles.

284 pages, Paperback

Published August 29, 2019

355 people are currently reading
1016 people want to read

About the author

Peter Kim

51 books33 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
140 (55%)
4 stars
84 (33%)
3 stars
20 (7%)
2 stars
4 (1%)
1 star
4 (1%)
Displaying 1 - 8 of 8 reviews
Profile Image for Darren Thomas.
1 review3 followers
Read
September 6, 2018
Unless you have read the previous book, this can be a difficult read. It does, however, provide wonderful references and sources to seek further information.
Profile Image for Omar Darwish.
4 reviews3 followers
September 17, 2018
This is a tapas sampler of security topics and should not be considered an independent text. It is an entertaining read, but it is poorly formatted with many grammatical and spelling mistakes.
Profile Image for F.
93 reviews9 followers
September 5, 2018
The 3rd addition to the Hacker Playbook series did not disappoint! There was plenty of new material from the last book making the new addition definitely worth the purchase. Most useful chapters are on phishing methods, AV bypass through meterpreter/payload recompilation and encoding, and some OSINT data collection. Attacks against NodeJS templating, NoSQL Injection, more advanced XSS, XXE, deserialization and more..

not organized as well as it could be; example is that you find out half-way through the book that there is a linux distro made for the book, one of the chapters has a link to a zip file with code samples for THP3. Lots of references to THP2 book and why they did and didn't include content, wasted space in some cases.

would highly recommend this book for new and experienced penetration testers and red teamers looking to add to their arsenal.
Profile Image for Ahmed Sultan.
78 reviews9 followers
May 17, 2018
Well ,
Not as much as expected compared to the previous 2 editions
the attacks were very limited , felt like the author was in a rush or something
still useful , but not alone , strongly advised to put it together along with the 2nd edition
Displaying 1 - 8 of 8 reviews

Can't find what you're looking for?

Get help and learn more about the design.