free counter statistics

Rtfm: Red Team Field Manual



The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to scan through a man page. The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell. The RTFM will repeatedly save you time looking up the hard to remember Windows nuances such as…

Rtfm

ISBN 10 : 1494295504
ISBN 13 : 9781494295509

The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to s..


Blue Team Field Manual

ISBN 10 : 154101636X
ISBN 13 : 9781541016361

Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Prote..


Blue Team Handbook

ISBN 10 : 1500734756
ISBN 13 : 9781500734756

Updated, Expanded, and released to print on 10/5/14! Complete details below! Two new sections, five protocol header illustrations, improved formatting, and other corrections. The B..


Red Team

ISBN 10 : 9780465073955
ISBN 13 : 0465073956

An international security expert shows how competitive organizations can get—and stay—ahead by thinking like their adversaries..


Penetration Testing

ISBN 10 : 9781593275648
ISBN 13 : 1593275641

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration tech..


Black Hat Python

ISBN 10 : 9781593275907
ISBN 13 : 1593275900

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you’ll explore the darker side of Python’s capabilities—writing network sniffe..


The Hacker Playbook 2

ISBN 10 : 1512214566
ISBN 13 : 9781512214567

Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker P..