A must buy for people who wants to move up the ladder in cyber security realm. Many interesting topics like C2 servers, Redirectors, data exfiltration and many more are covered which makes this book one of a kind. This book is recommended for pentesters who wants to enter the world of red teaming. The screenshots could have been more clear but other than that, I would rate this book 4.5/5. Authors have really done a great job.
This book is perfect for those who want to learn hardcore PT skills & wants to reach a Red Teamer level.
Stuck at reverse shell? Buy this book Stuck at pivoting? Buy this book Stuck at post exploitation? Buy this book Want to look for new exploitation tools? Buy this book Want to learn about infiltration & exfiltration? Buy this book
This book covers almost all the basic tools and concepts which are required for a Pentester to become a Red Teamer. The authors have done an amazing job here! Kudos to you guys.
If you are having basic understanding of security and want to improve your PT skills, this is the book you should read. This book introduces you to the world of red teaming. Info of some new tools you must hands on. In short it’s worth buying book.
If you are a pentester/hacker/researcher and planning to become a red teamer then you must have this book to learn the tools and techniques that comes handy while performing red team assessment. The author touches various important tools like Empire,Metasploit,Cobalt Strike,Armitage and explains the new techniques that can be used to remain undetected and get notified whenever a reverse shell comes. I liked the last three chapters very much because it contains how you can use a redirector and c2 just to avoid exposing your c&c ip. The book explains the techniques which involves uses of slack api,dropbox etc for helping in the exploitation. I would recommend this to all the pentesters who want to begin red team assessment. Take it as pre-requisite for understanding and diving into Red Team.
One of the best book for pentesters and security researchers, the book covers many tools and techniques for exploitation, maintaining access, reconnaissance and post exploitation. It gives you a detailed approach of how to perform penetration testing using which tool and why.