To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyses reviews to verify trustworthiness.
A decent enough list of commands/scripts for use in penetration testing with short descriptions. This is a slightly more terse version of the sort of notes most penetration testers will have already and I added a couple of these in to my own notes so it was worth the cost for that alone.
There are a couple of mistakes in the printed commands and some command under the wrong header but it adds to the fun when running through them all and scribbling in more notes!
This book is an absolute must for anyone who works in cyber security or as an red teamer / ethical hacker. This ISNT a howto book but a book filled with useful commands and scripts to use at a moments notice and is a great resource for open book exams and a must for revision for CREST and CEH exams. I use this on a daily basis as reference material for Nmap scans or powershell commands in my job as a security architect.
I am a PEN test user rather than participant. As such I found this compendium of useful little hackery fascinating. Be warned, there is little or no explanation, just hard facts, which for me was superb but for others may leave them confuse. I would recommend to a friend (shows what sort of friends I have I suppose) :-)
The contents are essential for any pentesting professional. Its an excellent piece of kit! But the cover is awful, it shows all marks very easily which makes the book look very dirty. It also shows bend marks very easily. If it wasn't for the cover being poor, it would easily reach 5 stars.
The content of the book it's self it's good but the external condition of the book was bent and scratched some people may not mind but for me personally I like things to look nice and be in a good condition
Really helpful information, a good guide handbook I new 70% of content already for windows section but the scripts where really helpful along with the kali.linux commands so worth every penny front cover Mark's easey but that don't worry me and also come with a section to make your own notes which is a nice touch
Not sure why this has so many great reviews. It's a handy reference but not anything that you can't write down yourself. The quality of the book and paper is also poor. Might be yourself if you're brand new to the command line, otherwise I would not recommend.
Clear and concise guide to the most well know commands to kick-off Red Team operations against numerous device and appliances on the digital edge. No actual methods nor steps of how to use these very powerful commands. Knowledge of networking and Linux / Unix a must to start off, imho. There are windows related stuff but nothing about the latest versions.
Enough for the very keen amateur to start learning Red Team opening tactics.
Useful for anyone contemplating doing the Certified Ethical Hacker (CEH) course and exam.