

Buy Rtfm: Red Team Field Manual 1.0 by Clark, Ben (ISBN: 9781787399051) from desertcart's Book Store. Everyday low prices and free delivery on eligible orders. Review: Nice quick reference book of Linux commands related to red team activities - useful for both learners, amateurs and pro's ^^ - Very nice quick reference guide containing the sorts of useful commands you would be forgiven for forgetting unless pen-testing is your full time job. For myself (or any geek) the book makes a nice quick reference guide for a host of common commands you might want to use while practising any sort of red team command line skills. Also the price is so very fair you might as well purchase the item for the nice cover. To the author Ben Clark, thank you for putting this together and getting the information all the way to print press - PDF's and printouts for this sort of thing are fine, but having relevant information consolidated into a little book like this is not only a smart move but is very much appreciated Review: Field manual for security professionals - This book is an absolute must for anyone who works in cyber security or as an red teamer / ethical hacker. This ISNT a howto book but a book filled with useful commands and scripts to use at a moments notice and is a great resource for open book exams and a must for revision for CREST and CEH exams. I use this on a daily basis as reference material for Nmap scans or powershell commands in my job as a security architect.
| Best Sellers Rank | 198,003 in Books ( See Top 100 in Books ) 849 in Web Administration 2,302 in Computer Science (Books) |
| Customer reviews | 4.6 4.6 out of 5 stars (3,365) |
| Dimensions | 13.97 x 0.56 x 21.59 cm |
| Edition | 1.0 |
| ISBN-10 | 1494295504 |
| ISBN-13 | 978-1787399051 |
| Item weight | 354 g |
| Language | English |
| Print length | 96 pages |
| Publication date | 11 Feb. 2014 |
| Publisher | CreateSpace Independent Publishing Platform |
E**H
Nice quick reference book of Linux commands related to red team activities - useful for both learners, amateurs and pro's ^^
Very nice quick reference guide containing the sorts of useful commands you would be forgiven for forgetting unless pen-testing is your full time job. For myself (or any geek) the book makes a nice quick reference guide for a host of common commands you might want to use while practising any sort of red team command line skills. Also the price is so very fair you might as well purchase the item for the nice cover. To the author Ben Clark, thank you for putting this together and getting the information all the way to print press - PDF's and printouts for this sort of thing are fine, but having relevant information consolidated into a little book like this is not only a smart move but is very much appreciated
T**N
Field manual for security professionals
This book is an absolute must for anyone who works in cyber security or as an red teamer / ethical hacker. This ISNT a howto book but a book filled with useful commands and scripts to use at a moments notice and is a great resource for open book exams and a must for revision for CREST and CEH exams. I use this on a daily basis as reference material for Nmap scans or powershell commands in my job as a security architect.
H**N
Great command reference
This contains a good quantity of commands to be used during a security test or general day-to-day sysadmin use. However, don't expect to receive any extensive coverage on how to use the commands, as each one only comes with a short description. This is useful for jogging the memory, and also has space for the reader to add their own notes. I would bet even a seasoned pen-tester would find some new information in this book. The reason for four stars is that the book contains some sloppy errors, and some of the commands can be hard to read due to the typographic choices.
N**S
super awesome for basics and level
super awesome for basics and level , handy sum-up, super cross platform wise, tiny bit too superficial for advanced forensic (field rather than planned if u follow me) use and maybe would have been handy if the size was bit smaller for pocketing. but since there is nothing comparable out there and I am possibly spoiled haha I give it all stars and quality of pages btw is awesome and print is quality and no probs reading, unline what many reviews stated. maybe things changed
A**R
Book
Good book , recommended Pentesting
N**D
Straight forward, blunt but brilliant.
Not even the reviews properly prepared me for what arrived in the mail today. Basically an intro-less, no nonsense 81 pages of memos, cheat sheets and info that replaces 15 pdfs with one pocket sized guide. I'm finding stuff useful for fields outside of pen-testing and cyber resilience. I honestly recommend this to anyone from Web programmers to sys admins. Just don't expect hand holding or explanations. Understanding is the reader's job, reminding is the book's.
D**T
For when you just need the right mehods
Contains some sloppy errors: careless. And the type of ink on the cover is awful for people like me, who are almost allergic to nails on the chalkboard. Brr. That said, this does contain useful and practical recipes for pentesters and tinkerers in the field. Features Linux, BSD, Windows and cisco examples. If you want the examples without the explanations this is the right book for you.
B**T
Good Resource
Really helpful information, a good guide handbook I new 70% of content already for windows section but the scripts where really helpful along with the kali.linux commands so worth every penny front cover Mark's easey but that don't worry me and also come with a section to make your own notes which is a nice touch
P**0
Obviously doesn't cover everything, but a nice resource to have at ones fingertips
P**A
Handbook com vários comandos para inúmeras situações, óptimo guia de referência para comandos
J**N
Bon livre de poche
A**R
Referenz für Pentester und Redteams im Außeneinsatz, wann immer man kein Google hat oder es nicht benutzen sollte. Das Buch enthält Befehle kurz und kompakt und ordentlich gegliedert. Man kann sich die Referenz auch selbst erstellen, aber so ist es einfacher und auch noch praktisch erprobt.
M**O
Il libro presenta un elenco di istruzioni per diversi sistemi operativi e/o linguaggi (dipende dalla sezione e dall'impiego indicato). Ad un neofita potrebbe sembrare criptico, in quanto mancano parti discorsive. Tuttavia è molto utile perchè trovandosi magari ad armeggiare con un S.O. diverso dal proprio (esempio su linux) è abbastanza facile trovare il comando per effettuare determinate azioni. La filosofia dietro questi libri è comunque quella di utilizzarli "a fin di bene". Le informazioni infatti se usate in maniera sbagliata (ad esempio per attaccare i server di qualcuno o rubare informazioni), potrebbero portarvi a seri problemi con la legge (esempio stupido: attaccate un server e lasciate traccia nei log: potreste trovarvi le autorità al citofono con un mandato). D'altro canto, conoscere i metodi di attacco aiuta i SysAdmin a verificare anzitempo eventuali vulnerabilità sui propri sistemi e quindi a metterli in sicurezza ed a limitare eventuali disastri. E' un prontuarietto da tenere sempre in tasca. Gli spazi bianchi, come notato da altri, vengono buoni per scriverci sopra appunti vari. Mi ha aperto un mondo, tant'è che pian piano acquisterò una serie di libri sull'argomento per approfondire di più l'aspetto della sicurezza informatica. Consigliato (forse più agli esperti che ai neofiti che potrebbero perdersi tra i numerosi comandi)!
Trustpilot
2 days ago
3 days ago