Remember that nothing can replace getting your hands dirty. Make sure to put the theory you learn into practice. Don’t be afraid to start, we’re all noobs.
Focusing on the areas of web application security where things have changed in recent years, this book covers the critical topic of discovering, exploiting, and preventing web application security flaws.
A senior security engineer at Salesforce, introduces three pillars of web application security — recon, offense, and defense. You’ll learn methods for effectively researching and analyzing modern web applications—including those you don’t have direct access to.
All of the basic topics to get you from zero to junior pentester level — covering everything you need to know to start breaking into the web application penetration testing industry or looking for bug bounties.
Michal Zalewski, one of the world's top browser security experts, offers a compelling narrative that explains exactly how browsers work and why they're fundamentally insecure.
Gain practical knowledge of application security and become a skilled bug bounty hunter by exploring a variety of related concepts, techniques, and tools.
This book focuses on real-world campaigns and attacks, exposing you to different initial entry points, exploitation, custom malware, persistence, and lateral movement.
The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for Red Team members who routinely find themselves on a mission without Google or the time to scan through a man page.
Using publicly disclosed vulnerabilities, Web Hacking 101 explains common web vulnerabilities and will show you how to start finding vulnerabilities and collecting bounties.
Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset.
William takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell (or command line). Along the way you'll learn the timeless skills handed down by generations of experienced, mouse-shunning gurus — file navigation, environment configuration, command chaining, pattern matching with regular expressions, and more.
You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks.