[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

Cyber security and penetration testing literature:

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 11
Thread images: 1

File: cyber_security.jpg (371KB, 1000x350px) Image search: [Google]
cyber_security.jpg
371KB, 1000x350px
I've already looked through both the technolo/g/y and /sci/ence wikias/stickies and whilst I've found some interesting reading, the lists are rather bare.

So, reading cyber security and pen testing books in my spare time (when I'm not studying mathematics) is one of my hobbies.

I was wondering if there were any books that /g/ would recommend as computer science is verboten on /sci/?
>>
Hacker's Delight: https://doc.lagout.org/security/Hackers%20Delight.pdf

Practical Malware Analysis: http://venom630.free.fr/pdf/Practical_Malware_Analysis.pdf

Metasploit: The Penetration Tester's Guide: https://repo.zenk-security.com/Metasploit/Metasploit-The%20Penetration%20Tester%20s%20Guide.pdf

That's a start desu.
>>
>>58055006
Thank you, anon, I was waiting for a based answer.
>>
No prob. The first two are geared toward the mathematics while the third is basically a user's guide for a penetration framework that's typically used in conjunction with Kali Linux.
>>
>>58055052
I think I pulled some decent metasploit literature off an onion. Thanks though.
>>
>>58055006
>Hacker's Delight
>Having anything to do with Cyber security and penetration testing

kek
>>
Go ahead and say it. You have no fucking clue what you're talking about.
>>
>>58055474
Excuse me, SIR, I am a CEH.
>>
>>58054492
just torrent a kali umedy course like a normal skiddy
>>
It's all bullshit script kiddie crap. You should learn about networks and how they work.
>>
what is metasploit for

how to use?
Thread posts: 11
Thread images: 1


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.