

Buy Rtfm: Red Team Field Manual 1.0 by Clark, Ben (ISBN: 9781787399051) from desertcart's Book Store. Everyday low prices and free delivery on eligible orders. Review: Nice quick reference book of Linux commands related to red team activities - useful for both learners, amateurs and pro's ^^ - Very nice quick reference guide containing the sorts of useful commands you would be forgiven for forgetting unless pen-testing is your full time job. For myself (or any geek) the book makes a nice quick reference guide for a host of common commands you might want to use while practising any sort of red team command line skills. Also the price is so very fair you might as well purchase the item for the nice cover. To the author Ben Clark, thank you for putting this together and getting the information all the way to print press - PDF's and printouts for this sort of thing are fine, but having relevant information consolidated into a little book like this is not only a smart move but is very much appreciated Review: Field manual for security professionals - This book is an absolute must for anyone who works in cyber security or as an red teamer / ethical hacker. This ISNT a howto book but a book filled with useful commands and scripts to use at a moments notice and is a great resource for open book exams and a must for revision for CREST and CEH exams. I use this on a daily basis as reference material for Nmap scans or powershell commands in my job as a security architect.
| Best Sellers Rank | 192,257 in Books ( See Top 100 in Books ) 902 in Web Administration 2,362 in Computer Science (Books) |
| Customer reviews | 4.6 4.6 out of 5 stars (3,366) |
| Dimensions | 13.97 x 0.56 x 21.59 cm |
| Edition | 1.0 |
| ISBN-10 | 1494295504 |
| ISBN-13 | 978-1787399051 |
| Item weight | 354 g |
| Language | English |
| Print length | 96 pages |
| Publication date | 11 Feb. 2014 |
| Publisher | CreateSpace Independent Publishing Platform |
E**H
Nice quick reference book of Linux commands related to red team activities - useful for both learners, amateurs and pro's ^^
Very nice quick reference guide containing the sorts of useful commands you would be forgiven for forgetting unless pen-testing is your full time job. For myself (or any geek) the book makes a nice quick reference guide for a host of common commands you might want to use while practising any sort of red team command line skills. Also the price is so very fair you might as well purchase the item for the nice cover. To the author Ben Clark, thank you for putting this together and getting the information all the way to print press - PDF's and printouts for this sort of thing are fine, but having relevant information consolidated into a little book like this is not only a smart move but is very much appreciated
T**N
Field manual for security professionals
This book is an absolute must for anyone who works in cyber security or as an red teamer / ethical hacker. This ISNT a howto book but a book filled with useful commands and scripts to use at a moments notice and is a great resource for open book exams and a must for revision for CREST and CEH exams. I use this on a daily basis as reference material for Nmap scans or powershell commands in my job as a security architect.
H**N
Great command reference
This contains a good quantity of commands to be used during a security test or general day-to-day sysadmin use. However, don't expect to receive any extensive coverage on how to use the commands, as each one only comes with a short description. This is useful for jogging the memory, and also has space for the reader to add their own notes. I would bet even a seasoned pen-tester would find some new information in this book. The reason for four stars is that the book contains some sloppy errors, and some of the commands can be hard to read due to the typographic choices.
N**S
super awesome for basics and level
super awesome for basics and level , handy sum-up, super cross platform wise, tiny bit too superficial for advanced forensic (field rather than planned if u follow me) use and maybe would have been handy if the size was bit smaller for pocketing. but since there is nothing comparable out there and I am possibly spoiled haha I give it all stars and quality of pages btw is awesome and print is quality and no probs reading, unline what many reviews stated. maybe things changed
A**R
Book
Good book , recommended Pentesting
N**D
Straight forward, blunt but brilliant.
Not even the reviews properly prepared me for what arrived in the mail today. Basically an intro-less, no nonsense 81 pages of memos, cheat sheets and info that replaces 15 pdfs with one pocket sized guide. I'm finding stuff useful for fields outside of pen-testing and cyber resilience. I honestly recommend this to anyone from Web programmers to sys admins. Just don't expect hand holding or explanations. Understanding is the reader's job, reminding is the book's.
D**T
For when you just need the right mehods
Contains some sloppy errors: careless. And the type of ink on the cover is awful for people like me, who are almost allergic to nails on the chalkboard. Brr. That said, this does contain useful and practical recipes for pentesters and tinkerers in the field. Features Linux, BSD, Windows and cisco examples. If you want the examples without the explanations this is the right book for you.
S**I
Printed in Great Britain by Amazon - An exercise of "controlled disclosure."
Clear and concise guide to the most well know commands to kick-off Red Team operations against numerous device and appliances on the digital edge. No actual methods nor steps of how to use these very powerful commands. Knowledge of networking and Linux / Unix a must to start off, imho. There are windows related stuff but nothing about the latest versions. Enough for the very keen amateur to start learning Red Team opening tactics. Useful for anyone contemplating doing the Certified Ethical Hacker (CEH) course and exam.
P**0
Obviously doesn't cover everything, but a nice resource to have at ones fingertips
P**A
Handbook com vários comandos para inúmeras situações, óptimo guia de referência para comandos
J**N
Bon livre de poche
A**R
Referenz für Pentester und Redteams im Außeneinsatz, wann immer man kein Google hat oder es nicht benutzen sollte. Das Buch enthält Befehle kurz und kompakt und ordentlich gegliedert. Man kann sich die Referenz auch selbst erstellen, aber so ist es einfacher und auch noch praktisch erprobt.
M**O
Il libro presenta un elenco di istruzioni per diversi sistemi operativi e/o linguaggi (dipende dalla sezione e dall'impiego indicato). Ad un neofita potrebbe sembrare criptico, in quanto mancano parti discorsive. Tuttavia è molto utile perchè trovandosi magari ad armeggiare con un S.O. diverso dal proprio (esempio su linux) è abbastanza facile trovare il comando per effettuare determinate azioni. La filosofia dietro questi libri è comunque quella di utilizzarli "a fin di bene". Le informazioni infatti se usate in maniera sbagliata (ad esempio per attaccare i server di qualcuno o rubare informazioni), potrebbero portarvi a seri problemi con la legge (esempio stupido: attaccate un server e lasciate traccia nei log: potreste trovarvi le autorità al citofono con un mandato). D'altro canto, conoscere i metodi di attacco aiuta i SysAdmin a verificare anzitempo eventuali vulnerabilità sui propri sistemi e quindi a metterli in sicurezza ed a limitare eventuali disastri. E' un prontuarietto da tenere sempre in tasca. Gli spazi bianchi, come notato da altri, vengono buoni per scriverci sopra appunti vari. Mi ha aperto un mondo, tant'è che pian piano acquisterò una serie di libri sull'argomento per approfondire di più l'aspetto della sicurezza informatica. Consigliato (forse più agli esperti che ai neofiti che potrebbero perdersi tra i numerosi comandi)!
Trustpilot
3 days ago
1 month ago