EUR 6,26
  • Tous les prix incluent la TVA.
En stock.
Expédié et vendu par Amazon.
Emballage cadeau disponible.
Quantité :1
Rtfm: Red Team Field Manu... a été ajouté à votre Panier
Amazon rachète votre
article EUR 0,81 en chèque-cadeau.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 2 images

Rtfm: Red Team Field Manual (Anglais) Broché – 11 février 2014


Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon Neuf à partir de Occasion à partir de
Broché
"Veuillez réessayer"
EUR 6,26
EUR 6,26 EUR 60,36

Offres spéciales et liens associés


Produits fréquemment achetés ensemble

Rtfm: Red Team Field Manual + Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
Prix pour les deux : EUR 15,69

Acheter les articles sélectionnés ensemble

Descriptions du produit

Présentation de l'éditeur

The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to scan through a man page. The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell. The RTFM will repeatedly save you time looking up the hard to remember Windows nuances such as Windows wmic and dsquery command line tools, key registry values, scheduled tasks syntax, startup locations and Windows scripting. More importantly, it should teach you some new red team techniques.


Vendez cet article - Prix de rachat jusqu'à EUR 0,81
Vendez Rtfm: Red Team Field Manual contre un chèque-cadeau d'une valeur pouvant aller jusqu'à EUR 0,81, que vous pourrez ensuite utiliser sur tout le site Amazon.fr. Les valeurs de rachat peuvent varier (voir les critères d'éligibilité des produits). En savoir plus sur notre programme de reprise Amazon Rachète.

Détails sur le produit

  • Broché: 96 pages
  • Editeur : CreateSpace Independent Publishing Platform; Édition : 1.0 (11 février 2014)
  • Langue : Anglais
  • ISBN-10: 1494295504
  • ISBN-13: 978-1494295509
  • Dimensions du produit: 14 x 0,6 x 21,6 cm
  • Moyenne des commentaires client : 3.5 étoiles sur 5  Voir tous les commentaires (2 commentaires client)
  • Classement des meilleures ventes d'Amazon: 11.162 en Livres anglais et étrangers (Voir les 100 premiers en Livres anglais et étrangers)
  •  Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?


En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Commentaires en ligne

3.5 étoiles sur 5
5 étoiles
0
4 étoiles
1
3 étoiles
1
2 étoiles
0
1 étoiles
0
Voir les deux commentaires client
Partagez votre opinion avec les autres clients

Commentaires client les plus utiles

2 internautes sur 2 ont trouvé ce commentaire utile  Par Florent le 18 juin 2014
Format: Broché Achat vérifié
A ce prix-là, ça peut servir de dépannage les fois où on n'a pas Internet.
Disons qu'il s'agit d'un recueil des premières commandes à taper sur un système, mais ça ne va pas vraiment plus loin.
Les lignes de commande ont été fourrées au chausse-pied dans le livre et ce n'est pas évident de les retrouver.
J'ai un peu peur de ranger ce livre dans ma bibliothèque et de ne jamais le ressortir.

J'ai noté aussi 2 ou 3 erreurs de copier/coller.
Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire. Si ce commentaire est inapproprié, dites-le nous.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Format: Broché Achat vérifié
bonne ouvrage qui nous donne les commande du MAN.

le man est utile pour la personne qui connait déjà la commande dont il a besoin.

La dernière évolution pour moi serai la traduction en français :-)
Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire. Si ce commentaire est inapproprié, dites-le nous.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 225 commentaires
112 internautes sur 116 ont trouvé ce commentaire utile 
Interested in an actual review? 16 mars 2014
Par Amazon Customer - Publié sur Amazon.com
Format: Broché Achat vérifié
These are all fun and stuff, but there needs to be a few actual reviews.

This book is essentially a decade's worth of notes from an experienced network security engineer or pen tester. It looks like someone published an evernote notebook. Formatting is inconsistent and at times confusing. There is a fair amount of duplication. Placeholders are inconsistent. There is no descriptive text or explanatory notes. It is a list of commands, and nothing more.

If you are an experienced command line user, it is pretty awesome.

That said, with around 2000 commands in the book, there in exactly one page of index. It is impossible to find anything. If it is windows, that's great, narrows things down to about 30 pages that you have to flip through to find what you want. Even though I often know exactly what I am looking for, I still end up flipping through nearly every page in the book to find it. That is frustrating.

It's true that everything here can be found elsewhere online, but that's a lot like saying that a thesaurus is just a list of words that you can find online. The proper formatting of actually useful DOS net commands, for instance, is a great example of why the book is more useful than a Google search.

I'd say this is pretty much a must-own book for anyone that has to work with computers. If you are in charge of security or testing, even better. I wish it was better indexed, but can't have everything. Certainly worth the money.
35 internautes sur 40 ont trouvé ce commentaire utile 
One of a kind 25 mars 2014
Par NetSecPro - Publié sur Amazon.com
Format: Broché Achat vérifié
I'm not sure what the bad reviews are all about. They complain about the text not being readable, no table of contents or the commands not being categorized. Totally false. The book is of great quality, the text absolutely normal, it has a table of contents and an Index at the end of the book. Also, all the commands are categorized, such as Windows Utility Commands, Windows Network Commands, Windows Remote Commands, etc. etc.. Table of Contents:
Nix, Windows, Networking, Tips and Tricks, Tool Syntax, Web, Databases, Programming, Wireless, References, Index.

You will find Nmap commands, SQLMAP, Powershell, Google Hacking, VPN, Putty, MS-SQL, Postgres, Tunneling... so many more to cover it here.

All I can think of is that someone got an early copy of this book, a very bad one...?? That's where the bad review came from? Or, someone with bad intentions.

Trust me: this is the best field manual you will ever find. Excellent resource.
22 internautes sur 24 ont trouvé ce commentaire utile 
Solid Reference - Missing Web Based Attacks 24 mars 2014
Par Amazon Customer - Publié sur Amazon.com
Format: Broché
I have never written a review, but after a co worker brought this in, and i looked it over I instantly put it on my 'to buy list' (and will have in my hands very soon).

Many of the items i constantly google for, or carry around in a beat up spiral bound notebook, can be found in this book. Somewhere between 30-50 percent located in a tiny book. Plus stuff i don't currently use, but may at any given moment.

The stuff that is missing, and would be HIGHLY useful (hope the author is reading), would be an expansion on the database section to include common SQL injection (union based / error based) and a section on other web based attacks like XSS (including <script>, <img>, body.onload, etc.).

As a follow up to those sections, methods of obfuscation (read filter evasion) are also highly needed for web based pen testing (a conversion chart or two for ascii -> url/hex/etc.)

Extremely impressed otherwise, and will soon be toting this book instead of my personal notes, very soon!

4/5 only because web based attacks were grossly overlooked.
61 internautes sur 80 ont trouvé ce commentaire utile 
A Better Love Story than "Twilight"! 3 avril 2014
Par The Doctor - Publié sur Amazon.com
Format: Broché Achat vérifié
This book is a little creepy - it has it all - stalking, surveillance, approaching your target, and taking command. It's sort of "Fifty Shades of Grey" meets basic shell scripting.

It starts with great Linux pickup lines but can be a little risque as it starts with mount commands right on the first page! Talk about aggressive! It also shows you how to "cover your tracks" if you're a "one night stand" kind of hacker - don't ping me, I'll ping you.

It even gets into inter-operating system relationships and various other things that are most likely still illegal south of the Mason-Dixon line.

Overall, it's a fascinating and tantalizing read and a MUCH better love story than "Twilight".

Seriously - this is a great "cheat sheet" kind of book for pen testing and general red-team activities.
3 internautes sur 3 ont trouvé ce commentaire utile 
Red Team Field Manual book review-great ideas 16 avril 2015
Par Andy - Publié sur Amazon.com
Format: Broché Achat vérifié
This book is a reference manual with common commands and charts frequently used by penetration testers. Even though I am a novice security professional, my training during Offensive Security Certified Professional (OSCP) training helps me understand a fair portion of the sections and commands within those sections. The book's font is small so there is a lot of information it although it is physically small. Of the sections and commands which are new to me, there is invaluable information which I will be exploring during my continuation of security training, including (OSCP). The first section relates to *nix operating systems. The majority of Linux network commands listed use flag settings and combinations which I haven't seen in most cases. A large portion of the book is dedicated to Windows commands. I have used some of the commands, but domain-related commands, essential for penetration testing, I have not yet used. Powershell is well-referenced, being the hip, new way to interact with the Windows environment.

Some commands listed are absolute gold-examples are creating a Windows native port forwarding, something I did not know possible. There's a nice script to acquire the permissions of all services executables, important for privilege escalation in Windows. Important persistence commands for both Linux and Windows are listed. There are methods to perform screen shots and video of remote users. This could be useful to demonstrate total ownage to a management-type. Showing them working on their own computer gets the point across emphatically.

From a novice penetration tester perspective, I feel these is likely benefit to this book and I will keep it handy at all times. It can be used to supplement a repository of reference material.
Ces commentaires ont-ils été utiles ? Dites-le-nous


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?