Prose Supplements - Shop now
Add Prime to get Fast, Free delivery
Amazon prime logo
Buy new:
-5% $28.45
FREE delivery Wednesday, April 9 on orders shipped by Amazon over $35
Ships from: Amazon.com
Sold by: Amazon.com
$28.45 with 5 percent savings
List Price: $29.95
Get Fast, Free Shipping with Amazon Prime FREE Returns
FREE delivery Wednesday, April 9 on orders shipped by Amazon over $35
Or Prime members get FREE delivery Monday, April 7. Order within 6 hrs 53 mins.
In Stock
$$28.45 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$28.45
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Ships from
Amazon.com
Amazon.com
Ships from
Amazon.com
Sold by
Amazon.com
Amazon.com
Sold by
Amazon.com
Returns
30-day refund/replacement
30-day refund/replacement
This item can be returned in its original condition for a full refund or replacement within 30 days of receipt.
Payment
Secure transaction
Your transaction is secure
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
$22.18
Get Fast, Free Shipping with Amazon Prime FREE Returns
Ships Directly from Amazon! Ships Directly from Amazon! See less
FREE delivery Wednesday, April 9 on orders shipped by Amazon over $35
Or fastest delivery Tuesday, April 8. Order within 6 hrs 53 mins
Only 1 left in stock - order soon.
$$28.45 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$28.45
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Access codes and supplements are not guaranteed with used items.
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the author

Something went wrong. Please try your request again later.

The Hacker Playbook 3: Practical Guide To Penetration Testing

4.7 out of 5 stars 1,030 ratings

{"desktop_buybox_group_1":[{"displayPrice":"$28.45","priceAmount":28.45,"currencySymbol":"$","integerValue":"28","decimalSeparator":".","fractionalValue":"45","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"if1FMsMXkDwXK5Uf7RTex2pkCaB%2FJnvyyFXcK%2BBzwEnf2nrO6gBG8tQGVMfNZ2PDeGrxT4B381jSIoduCum2sVsiX7YZV3dXGLJ5L4ycHzmhn8TnBz%2BYmV%2FL8ZAPCqQMTAkgikYK%2BYvG9p6nnoTitw%3D%3D","locale":"en-US","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}, {"displayPrice":"$22.18","priceAmount":22.18,"currencySymbol":"$","integerValue":"22","decimalSeparator":".","fractionalValue":"18","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"if1FMsMXkDwXK5Uf7RTex2pkCaB%2FJnvyt8vtnDCksE%2F%2BgIjcjCT1P%2F9YaFJIEG3AJsbFmKngkP00S690U3orkS9%2BGXVxLYXAWshuYkQlTHTPG2NYegMhtFAMQ4K9Xk657eyKcOiF%2Bq17Yrobd5i58r6ZDKahzXae%2FckthlmznDvnkv9uz%2Bdbny50kzmbGjlO","locale":"en-US","buyingOptionType":"USED","aapiBuyingOptionIndex":1}]}

Purchase options and add-ons

Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. With a combination of new strategies, attacks, exploits, tips and tricks, you will be able to put yourself in the center of the action toward victory.

The main purpose of this book is to answer questions as to why things are still broken. For instance, with all the different security products, secure code reviews, defense in depth, and penetration testing requirements, how are we still seeing massive security breaches happening to major corporations and governments? The real question we need to ask ourselves is, are all the safeguards we are putting in place working? This is what The Hacker Playbook 3 - Red Team Edition is all about.

By now, we are all familiar with penetration testing, but what exactly is a Red Team? Red Teams simulate real-world, advanced attacks to test how well your organization's defensive teams respond if you were breached. They find the answers to questions like: Do your incident response teams have the right tools, skill sets, and people to detect and mitigate these attacks? How long would it take them to perform these tasks and is it adequate? This is where you, as a Red Teamer, come in to accurately test and validate the overall security program.

THP3 will take your offensive hacking skills, thought processes, and attack paths to the next level. This book focuses on real-world campaigns and attacks, exposing you to different initial entry points, exploitation, custom malware, persistence, and lateral movement--all without getting caught! This heavily lab-based book will include multiple Virtual Machines, testing environments, and custom THP tools.

So grab your helmet and let's go break things! For more information, visit http://thehackerplaybook.com/about/.


Great on Kindle
Great Experience. Great Value.
iphone with kindle app
Putting our best book forward
Each Great on Kindle book offers a great reading experience, at a better value than print to keep your wallet happy.

Explore your book, then jump right back to where you left off with Page Flip.

View high quality images that let you zoom in to take a closer look.

Enjoy features only possible in digital – start reading right away, carry your library with you, adjust the font, create shareable notes and highlights, and more.

Discover additional details about the events, people, and places in your book, with Wikipedia integration.

Get the free Kindle app: Link to the kindle app page Link to the kindle app page
Enjoy a great reading experience when you buy the Kindle edition of this book. Learn more about Great on Kindle, available in select categories.

Frequently bought together

This item: The Hacker Playbook 3: Practical Guide To Penetration Testing
$28.45
Get it as soon as Wednesday, Apr 9
In Stock
Ships from and sold by Amazon.com.
+
$24.90
Get it as soon as Wednesday, Apr 9
In Stock
Ships from and sold by Amazon.com.
+
$24.99
Get it as soon as Wednesday, Apr 9
In Stock
Ships from and sold by Amazon.com.
Total price: $00
To see our price, add these items to your cart.
Details
Added to Cart
Choose items to buy together.

Product details

  • Publisher ‏ : ‎ Independently published (May 2, 2018)
  • Language ‏ : ‎ English
  • Paperback ‏ : ‎ 289 pages
  • ISBN-10 ‏ : ‎ 1980901759
  • ISBN-13 ‏ : ‎ 978-1980901754
  • Item Weight ‏ : ‎ 1.12 pounds
  • Dimensions ‏ : ‎ 7 x 0.66 x 10 inches
  • Customer Reviews:
    4.7 out of 5 stars 1,030 ratings

About the author

Follow authors to get new release updates, plus improved recommendations.
Peter Kim
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Peter Kim has been in the information security industry for more than 14 years and has been running Penetration Testing/Red Teams for more than 12 years. He has worked for multiple utility companies, Fortune 1000 entertainment companies, government agencies, and large financial organizations. Although he is most well-known for The Hacker Playbook series, his passions are building a safe security community, mentoring students, and training others. He founded and maintains one of Southern California's largest technical security clubs called LETHAL (www.meetup.com/LETHAL), performs private training at his warehouse LETHAL Security (lethalsecurity.com), and runs a boutique penetration testing firm called Secure Planet (www.SecurePla.net).

Peter's main goal with The Hacker Playbook series is to instill passion into his readers and get them to think outside the box. With the ever-changing environment of security, he wants to help build the next generation of security professionals.

Feel free to contact Peter Kim for any of the following:

• Questions about the book: book@thehackerplaybook.com

• Twitter: @hackerplaybook

Customer reviews

4.7 out of 5 stars
1,030 global ratings

Review this product

Share your thoughts with other customers

Customers say

Customers find the book provides a great foundation of information and explains techniques in simple-to-understand concepts, with step-by-step breakdowns that make it a valuable primary resource. Moreover, the book is well-written and easy to read, making it particularly suitable for security analysts.

AI-generated from the text of customer reviews

36 customers mention "Information quality"35 positive1 negative

Customers praise the book's information quality, appreciating its step-by-step breakdowns and simple-to-understand explanations of techniques.

"...tools and step by step actionable instructions that open up door after door of knowledge to widen your perspective and deepen your knowledge...." Read more

"...and overview of some of the must-have tactics, tools and procedures any red team who is aiming to get to the next level of sophistication should..." Read more

"...For the cost of a delivery pizza, you'll get a book with twice the useful content and none of the page count padding filler that you'll find with..." Read more

"Good information, not organized as well as it could be; example is that you find out half-way through the book that there is a linux distro made for..." Read more

16 customers mention "Security professionals"16 positive0 negative

Customers find the book valuable for security professionals, particularly for security analysts, and appreciate how it acts as a primer for the hacking mindset.

"...Real, hands on experience with practical examples that currently work, not just resume fluff...." Read more

"...readers of varying skill levels the ability to perform modern attacks against modern environments. I highly recommend picking up a copy!" Read more

"...The book does an excellent job at this and there are A LOT of tools given to you throughout this book...." Read more

"...getting to detailed on the 'how', it does a great job of acting as a primer for the hacking mindset...." Read more

10 customers mention "Readability"10 positive0 negative

Customers find the book well written and easy to read, with one customer noting that the notebook-style material is clearly organized in specific phases.

"...However, the notebook style material is very clearly organized in specific phases so you don't got lost down the rabbit hole of Pentesting..." Read more

"...Its not all "algorithms" or "numbers", its paragraph format with some examples thrown about...." Read more

"...methods and techniques used by red teamers in a practical and easy-to-read manner...." Read more

"...The format makes the book easy to read, and the logical order of the book makes it a great reference material...." Read more

A peek behind the curtain
5 out of 5 stars
A peek behind the curtain
Bought it mainly for exposure to the element but it seems to be very interesting if you have the time.
Thank you for your feedback
Sorry, there was an error
Sorry we couldn't load the review

Top reviews from the United States

  • Reviewed in the United States on May 15, 2018
    Need a hands-on practical step-by-step strategies...tools...labs...instructions...Tips & Tricks?! Well, this series of books has it all and is for YOU! Version 3 has arrived...so, roll up your sleeves and get ready to dive right into the depths and heart of pentesting with Peter Kim as your guide! Each page is packed with references, tools and step by step actionable instructions that open up door after door of knowledge to widen your perspective and deepen your knowledge. After reading just a few pages...I spent another several hours going through the links provided, installing tools, exploring the tools, and understanding lab setups. Then, on to the next set of few pages. This book is densely packed and small doses will take you a long way. However, the notebook style material is very clearly organized in specific phases so you don't got lost down the rabbit hole of Pentesting Wonderland. The explanations are well-written and straight to the point. So get busy and enjoy this book! Thank you, Peter! Excellent work!
    9 people found this helpful
    Report
  • Reviewed in the United States on July 16, 2018
    As a red team lead, it is often challenging to find quality technical literature focused on managing and executing red team operations. Other books focus on theory or provide too high-level guidance that is not actionable (i.e. ensure you red team your cloud environment), whereas Peter Kim provides direct proof of concepts and technical guidance. This book isn't intended to cover every possible red team attack scenario, but it is an excellent resource and overview of some of the must-have tactics, tools and procedures any red team who is aiming to get to the next level of sophistication should incorporate into their baseline.

    Peter does an excellent job breaking down each phase of an engagement into it's own contained section. This makes it easy for red team operators to go back and reference a particular tool, as there are dedicated sections for initial setup, reconnaissance, web app, etc.

    Lastly, I have to compliment Peter's ability to engage his audience. The book incorporates internet-accessible web/network challenges. This is great if you don't have a handy lab to test the discovery tools and attacks out against. This extra attention to detail further enables readers to grasp concepts by actually executing a simulated attack.
    13 people found this helpful
    Report
  • Reviewed in the United States on May 16, 2018
    As good a primary resource and supplemental field book on offensive security as exists. The information is presented in as plain English as is possible and it's clear the author actually wants you to know and learn what he has in his wealth of experience. Real, hands on experience with practical examples that currently work, not just resume fluff. No cryptic talk and/or generic, old examples while withholding the good stuff, no useless buzzwords or self aggrandizement, just the good stuff, pure and simple with as little frills and distraction as possible. For the cost of a delivery pizza, you'll get a book with twice the useful content and none of the page count padding filler that you'll find with almost any of the ~$50 alternatives out there.
    2 people found this helpful
    Report
  • Reviewed in the United States on June 4, 2018
    Good information, not organized as well as it could be; example is that you find out half-way through the book that there is a linux distro made for the book, one of the chapters has a link to a zip file with code samples for THP3. Lots of references to THP2 book and why they did and didn't include content, wasted space in some cases.
    Most useful chapters are on phishing methods, AV bypass through meterpreter/payload recompilation and encoding, and some OSINT data collection.
    14 people found this helpful
    Report
  • Reviewed in the United States on November 4, 2024
    Thanks!
  • Reviewed in the United States on September 6, 2020
    I'm not really a computer whiz, but I found this book pop up on amazon and showed some interest...I guess I've just got interest in the "bad-boys gone good" in life :)

    I can read a page at a time, and get general information, though he does go into some detail, I think. He claims to not be a writer, but its produced in such a way that's fine to read. Its not all "algorithms" or "numbers", its paragraph format with some examples thrown about.

    This book is as the disclaimer author says (paraphrased), good-guy-hackers. Don't do this illegally, or you'll get in trouble...but if your helping your own company out, here's how to do it...gosh I hope I'm remembering the authors note right XD
    One person found this helpful
    Report
  • Reviewed in the United States on May 23, 2018
    The Hacker Playbook 3 is a fantastic addition to the series, and illustrates the latest methods and techniques used by red teamers in a practical and easy-to-read manner. Using trusted Windows utilities to execute code and bypass application whitelisting, dumping NTLM hashes from Windows 10 without touching LSASS, and "living off the land" are just a few of the topics covered in this book that can provide readers of varying skill levels the ability to perform modern attacks against modern environments. I highly recommend picking up a copy!
  • Reviewed in the United States on May 7, 2018
    The 3rd addition to the Hacker Playbook series did not disappoint! There was plenty of new material from the last book making the new addition definitely worth the purchase. The author included VMs to actually practice some of the techniques and exploitation methods discussed in the book. My favorite part was a vulnerable web application (included with book) that allows you to put into practice some of the newer web attacks seen today. Attacks against NodeJS templating, NoSQL Injection, more advanced XSS, XXE, deserialization and more.. The author also included some pro tips on how to leverage BugBounties in the real world to up your game and make some cash. I would highly recommend this book for new and experienced penetration testers and red teamers looking to add to their arsenal.
    29 people found this helpful
    Report

Top reviews from other countries

Translate all reviews to English
  • Gabriel Matias
    5.0 out of 5 stars Not for beginner's
    Reviewed in Mexico on July 29, 2020
    Not for beginner's
  • Javier
    5.0 out of 5 stars Una Guía Indispensable para Pen Testing
    Reviewed in Spain on January 23, 2024
    Este libro, "The Hacker Playbook 3", es una joya para aquellos que buscan sumergirse en el fascinante mundo de la ciberseguridad y la prueba de penetración. Lo que hace que este libro destaque es su enfoque práctico y orientado a la acción. Desde el principio, el autor ofrece una perspectiva única y valiosa sobre las técnicas y herramientas esenciales para llevar a cabo pruebas de penetración de manera efectiva.

    Lo que realmente aprecio es la forma en que el autor presenta casos de estudio del mundo real, proporcionando escenarios prácticos que ilustran los conceptos discutidos. Esta conexión entre la teoría y la práctica hace que la información sea accesible incluso para aquellos que están dando sus primeros pasos en el campo de la seguridad informática.

    Además, la estructura del libro es clara y bien organizada, lo que facilita el seguimiento y la asimilación de la información. Desde la planificación de una prueba de penetración hasta la ejecución y el análisis de resultados, cada fase se aborda de manera exhaustiva.

    En resumen, "The Hacker Playbook 3" es más que un libro; es una herramienta esencial para aquellos que buscan entender y mejorar sus habilidades en el campo de la ciberseguridad. Este libro ha encontrado un lugar destacado en mi estantería, y lo recomiendo encarecidamente a todos aquellos que estén interesados en el emocionante y siempre cambiante mundo de la seguridad informática.
    Report
  • Tacio
    5.0 out of 5 stars Bem didático e gostoso de ler.
    Reviewed in Brazil on September 3, 2021
    O livro segue a mesma linha que os outros da coleção. Mas entra a fundo em assuntos mais novos de segurança. Bem bacana.
  • Amazon カスタマー
    5.0 out of 5 stars nice
    Reviewed in Japan on December 7, 2018
    good
  • Mansour Ahmed
    5.0 out of 5 stars quality
    Reviewed in the United Kingdom on October 10, 2022
    Thank you