Computer & Technology

The Best Books About Hacking And Hackers

“What are the best books about Hacking and Hackers?” We looked at 145 of the top Hacking books, aggregating and ranking them so we could answer that very question!

The top 30 titles, all appearing on 3 or more “Best Hacking” book lists, are ranked below by how many lists they appear on. The remaining 100+ titles, as well as the lists we used are in alphabetical order at the bottom of the page.

Happy Scrolling!



Top 30 Books About Hacking



30 .) A Bug Hunter’s Diary: A Guided Tour Through the Wilds of Software Security written by Tobias Klein

Lists It Appears On:

  • Goodreads 2
  • SEC Zine
  • Yeah Hub

A Bug Hunter’s Diary follows security expert Tobias Klein as he tracks down and exploits bugs in some of the world’s most popular software, like Apple’s iOS, the VLC media player, web browsers, and even the Mac OS X kernel. In this one-of-a-kind account, you’ll see how the developers responsible for these flaws patched the bugs—or failed to respond at all. As you follow Klein on his journey, you’ll gain deep technical knowledge and insight into how hackers approach difficult problems and experience the true joys (and frustrations) of bug hunting.

View / Buy On Amazon


29 .) CompTIA Security+: Get Certified Get Ahead: SY0-301 Study Guide

Lists It Appears On:

  • Code Condo
  • Comps Mag
  • From Dev

CompTIA Security+: Get Certified Get Ahead: SY0-301 Study Guide is an update to the top-selling SY0-201 guide, which helped thousands of readers pass the exam the first time they took it. The SY0-301 version covers every aspect of the SY0-301 exam, and includes the same elements readers raved about in the previous version. Each of the eleven chapters presents topics in an easy to understand manner and includes real-world examples of security principles in action. The author uses many of the same analogies and explanations he’s honed in the classroom that have helped hundreds of students master the Security+ content. You’ll understand the important and relevant security topics for the Security+ exam, without being overloaded with unnecessary details. Additionally, each chapter includes a comprehensive review section to help you focus on what’s important. Over 450 realistic practice test questions with in-depth explanations will help you test your comprehension and readiness for the exam. The book includes a 100 question pre-test, a 100 question post-test, and practice test questions at the end of every chapter. Each practice test question includes a detailed explanation to help you understand the content and the reasoning behind the question. You’ll be ready to take and pass the exam the first time you take it. If you plan to pursue any of the advanced security certifications, this guide will also help you lay a solid foundation of security knowledge. Learn this material, and you’ll be a step ahead for other exams. This SY0-301 study guide is for any IT or security professional interested in advancing in their field, and a must read for anyone striving to master the basics of IT systems security. The author supplements the book with blog posts here: http: //blogs.getcertifiedgetahead.com/. This page provides a full listing of mobile device apps from the author: http: //learnzapp.com/partners/darrilgibson/

View / Buy On Amazon


28 .) Hacker’s Delight written by Henry S. Warren Jr.

Lists It Appears On:

  • Book Depository
  • Goodreads
  • Goodreads 2

Aiming to tell the dark secrets of computer arithmetic, this title is suitable for library developers, compiler writers, and lovers of elegant hacks.

View / Buy On Amazon


27 .) Hackers: Heroes of the Computer Revolution written by Steven Levy

Lists It Appears On:

  • Goodreads
  • Goodreads 2
  • Solutions

A mere fifteen years ago, computer nerds were seen as marginal weirdos, outsiders whose world would never resonate with the mainstream. That was before one pioneering work documented the underground computer revolution that was about to change our world forever. With groundbreaking profiles of Bill Gates, Steve Wozniak, MIT’s Tech Model Railroad Club, and more, Steven Levy’s Hackers brilliantly captured a seminal moment when the risk-takers and explorers were poised to conquer twentieth-century America’s last great frontier. And in the Internet age, the hacker ethic-first espoused here-is alive and well.

View / Buy On Amazon


26 .) Hacking the Xbox: An Introduction to Reverse Engineering written by Andrew Huang

Lists It Appears On:

  • Goodreads
  • Goodreads 2
  • Solutions

This hands on guide to hacking begins with step by step tutorials on hardware modifications that teach basic hacking techniques as well as essential reverse engineering skills The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics with an emphasis on educating the readers on the important subjects of computer security and reverse engineering Hacking the Xboxincludes numerous practical guides such as where to get hacking gear soldering techniques debugging tips and an Xbox hardware reference guide Hacking the Xboxalso confronts the social and political issues facing today s hacker by looking forward and discussing the impact of today s legal challenges on legitimate reverse engineering activities The book includes a chapter written by the Electronic Frontier Foundation EFF about the rights and responsibilities of hackers and concludes by discussing the latest trends and vulnerabilities in secure PC platforms

View / Buy On Amazon


25 .) Masters of Deception: The Gang That Ruled Cyberspace written by Michelle Slatalla

Lists It Appears On:

  • Goodreads
  • Goodreads 2
  • Solutions

The bestselling account of a band of kids from New York who fought an electronic turf war that ranged across some of the nation’s most powerful computer systems.

View / Buy On Amazon


24 .) The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers written by Kevin D. Mitnick

Lists It Appears On:

  • Book Depository
  • Goodreads
  • Goodreads 2

Kevin Mitnick, the world’s most celebrated hacker, now devotes hislife to helping businesses and governments combat data thieves,cybervandals, and other malicious computer intruders. In hisbestselling The Art of Deception, Mitnick presented fictionalizedcase studies that illustrated how savvy computer crackers use”social engineering” to compromise even the most technically securecomputer systems. Now, in his new book, Mitnick goes one stepfurther, offering hair-raising stories of real-life computerbreak-ins-and showing how the victims could have prevented them.

View / Buy On Amazon


23 .) The Browser Hacker’s Handbook written by Wade Alcorn

Lists It Appears On:

  • Bonkers About Tech
  • Book Depository
  • Goodreads 2

Hackers exploit browser vulnerabilities to attack deep withinnetworks The Browser Hacker’s Handbook gives a practicalunderstanding of hacking the everyday web browser and using it as abeachhead to launch further attacks deep into corporate networks.Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range ofcurrent attack methods. The web browser has become the most popular and widely usedcomputer “program” in the world. As the gateway to the Internet, itis part of the storefront to any business that operates online, butit is also one of the most vulnerable entry points of any system.With attacks on the rise, companies are increasingly employingbrowser-hardening techniques to protect the unique vulnerabilitiesinherent in all currently used browsers. The Browser Hacker’sHandbook thoroughly covers complex security issues and exploresrelevant topics such as: Bypassing the Same Origin Policy ARP spoofing, social engineering, and phishing to accessbrowsers DNS tunneling, attacking web applications, andproxying–all from the browser Exploiting the browser and its ecosystem (plugins andextensions) Cross-origin attacks, including Inter-protocol Communicationand Exploitation The Browser Hacker’s Handbook is written with aprofessional security engagement in mind. Leveraging browsers aspivot points into a target’s network should form an integralcomponent into any social engineering or red-team securityassessment. This handbook provides a complete methodology tounderstand and structure your next browser penetration test.

View / Buy On Amazon


22 .) The Girl with the Dragon Tattoo written by Stieg Larsson

Lists It Appears On:

  • Goodreads 2
  • Redital Group
  • Tor

View / Buy On Amazon


21 .) The Hacker Crackdown: Law and Disorder on the Electronic Frontier written by Bruce Sterling

Lists It Appears On:

  • Goodreads
  • Goodreads 2
  • Solutions

A journalist investigates the past, present, and future of computer crimes, as he attends a hacker convention, documents the extent of the computer crimes, and presents intriguing facts about hackers and their misdoings.

View / Buy On Amazon


20 .) The Hacker Playbook: Practical Guide To Penetration Testing written by Peter Kim

Lists It Appears On:

  • Goodreads 2
  • Xeus Hack
  • Yeah Hub

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field. Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, and evading antivirus software. From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience. Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.

View / Buy On Amazon


19 .) The Shellcoder’s Handbook: Discovering and Exploiting Security Holes written by Jack Koziol

Lists It Appears On:

  • Bonkers About Tech
  • Goodreads 2
  • Hacking Tutorials

This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking “unbreakable” software packages such as McAfee’s Entercept, Mac OS X, XP, Office 2003, and VistaAlso features the first-ever published information on exploiting Cisco’s IOS, with content that has never before been exploredThe companion Web site features downloadable code files

View / Buy On Amazon


18 .) Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers written by T.J. O’Connor

Lists It Appears On:

  • Bonkers About Tech
  • Goodreads 2
  • Yeah Hub

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus. Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices Data-mine popular social media websites and evade modern anti-virus

View / Buy On Amazon


17 .) Gray Hat Hacking: The Ethical Hacker’s Handbook written by Allen Harper

Lists It Appears On:

  • Bonkers About Tech
  • Book Depository
  • Goodreads 2
  • Hacker9

View / Buy On Amazon


16 .) Little Brother written by Cory Doctorow

Lists It Appears On:

  • Goodreads 2
  • Redital Group
  • The Nation
  • Tor

Marcus aka “w1n5t0n,” is only seventeen years old, but he figures he already knows how the system works–and how to work the system. Smart, fast, and wise to the ways of the networked world, he has no trouble outwitting his high school’s intrusive but clumsy surveillance systems. But his whole world changes when he and his friends find themselves caught in the aftermath of a major terrorist attack on San Francisco. In the wrong place at the wrong time, Marcus and his crew are apprehended by the Department of Homeland Security and whisked away to a secret prison where they’re mercilessly interrogated for days. When the DHS finally releases them, his injured best friend Darryl does not come out. The city has become a police state where every citizen is treated like a potential terrorist. He knows that no one will believe his story, which leaves him only one option: “M1k3y” will take down the DHS himself.

View / Buy On Amazon


15 .) BackTrack 5 Wireless Penetration Testing Beginner’s Guide

Lists It Appears On:

  • Code Condo
  • Comps Mag
  • From Dev
  • SEC Zine
  • Tech Worm

Written in Packt’s Beginner’s Guide format, you can easily grasp the concepts and understand the techniques to perform wireless attacks in your lab. Every new attack is described in the form of a lab exercise with rich illustrations of all the steps associated. You will practically implement various attacks as you go along. If you are an IT security professional or a security consultant who wants to get started with wireless testing with Backtrack, or just plain inquisitive about wireless security and hacking, then this book is for you. The book assumes that you have familiarity with Backtrack and basic wireless concepts.

View / Buy On Amazon


14 .) Penetration Testing: A Hands-On Introduction to Hacking written by Georgia Weidman

Lists It Appears On:

  • Book Depository
  • Goodreads 2
  • Hacking Tutorials
  • Yeah Hub
  • Yeah Hub

In Penetration Testing, security researcher and trainer Georgia Weidman provides you with a survey of important skills that any aspiring pentester needs. This beginner-friendly book opens with some basics of programming and helps you navigate Kali Linux, an operating system that comes preloaded with useful computer security tools like Wireshark and Metasploit. You’ll learn about gathering information on a target, social engineering, capturing network traffic, analyzing vulnerabilities, developing exploits, and more. Hands-on examples discuss even advanced topics like mobile device security and bypassing anti-virus software.

View / Buy On Amazon


13 .) Social Engineering: The Art of Human Hacking written by Christopher Hadnagy

Lists It Appears On:

  • Goodreads
  • Goodreads 2
  • Hacker9
  • MIT Nick Security
  • SEC Zine

The first book to reveal and dissect the technical aspect ofmany social engineering maneuvers From elicitation, pretexting, influence and manipulation allaspects of social engineering are picked apart, discussed andexplained by using real world examples, personal experience and thescience behind them to unraveled the mystery in socialengineering. Kevin Mitnick–one of the most famous social engineers inthe world–popularized the term “socialengineering.” He explained that it is much easier to tricksomeone into revealing a password for a system than to exert theeffort of hacking into the system. Mitnick claims that this socialengineering tactic was the single-most effective method in hisarsenal. This indispensable book examines a variety of maneuversthat are aimed at deceiving unsuspecting victims, while it alsoaddresses ways to prevent social engineering threats. Examines social engineering, the science of influencing atarget to perform a desired task or divulge information Arms you with invaluable information about the many methods oftrickery that hackers use in order to gather information with theintent of executing identity theft, fraud, or gaining computersystem access Reveals vital steps for preventing social engineeringthreats Social Engineering: The Art of Human Hacking does itspart to prepare you against nefarious hackers–now you can doyour part by putting to good use the critical information withinits pages.

View / Buy On Amazon


12 .) The Web Application Hacker’s Handbook: Discovering and Exploiting Security Flaws written by Dafydd Stuttard

Lists It Appears On:

  • Bonkers About Tech
  • Goodreads
  • Goodreads 2
  • Hacking Tutorials
  • SEC Zine

This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results. The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias “PortSwigger,” Dafydd developed the popular Burp Suite of web application hack tools.

View / Buy On Amazon


11 .) Underground: Tales of Hacking, Madness, and Obsession on the Electronic Frontier written by Suelette Dreyfus

Lists It Appears On:

  • Book Depository
  • Goodreads
  • Goodreads
  • Solutions
  • The Nation

Suelette Dreyfus and her co-author, WikiLeaks founder Julian Assange, tell the extraordinary true story of the computer underground, and the bizarre lives and crimes of an elite ring of international hackers who took on the establishment. Spanning three continents and a decade of high level infiltration, they created chaos amongst some of the world’s biggest and most powerful organisations, including NASA and the US military. Brilliant and obsessed, many of them found themselves addicted to hacking and phreaking. Some descended into drugs and madness, others ended up in jail.As riveting as the finest detective novel and meticulously researched, Underground follows the hackers through their crimes, their betrayals, the hunt, raids and investigations. It is a gripping tale of the digital underground.

View / Buy On Amazon


10 .) Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker written by Kevin D. Mitnick

Lists It Appears On:

  • Bonkers About Tech
  • Book Depository
  • Goodreads
  • Goodreads 2
  • MIT Nick Security
  • Tor

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies, and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable. For Mitnick, hacking wasn’t just about technological feats; it was an old-fashioned confidence game that required guile and deception to trick the unwitting out of valuable information. Driven by a powerful urge to accomplish the impossible, Mitnick bypassed security systems and blazed into major organizations including Motorola, Sun Microsystems, and Pacific Bell. As the FBI’s net began to tighten, Mitnick went on the run, engaging in an increasingly sophisticated cat-and-mouse game that led through false identities, a host of cities, plenty of close shaves, and an ultimate showdown with the Feds, who would stop at nothing to bring him down. Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escape, and a portrait of a visionary whose creativity, skills, and persistence forced the authorities to rethink the way they pursued him, inspiring ripples that brought permanent changes in the way people and companies protect their most sensitive information.

View / Buy On Amazon


9 .) Hacking For Dummies written by Kevin Beaver

Lists It Appears On:

  • Book Depository
  • Goodreads
  • Goodreads 2
  • Hacker9
  • Lifewire
  • Xeus Hack

Are you worried about external hackers and rogue insiders breaking into your systems? Whether it’s social engineering, network infrastructure attacks, or application hacking, security breaches in your systems can devastate your business or personal life. In order to counter these cyber bad guys, you must become a hacker yourself–an ethical hacker. Hacking for Dummies shows you just how vulnerable your systems are to attackers. It shows you how to find your weak spots and perform penetration and other security tests. With the information found in this handy, straightforward book, you will be able to develop a plan to keep your information safe and sound. You’ll discover how to: Work ethically, respect privacy, and save your system from crashing Develop a hacking plan Treat social engineers and preserve their honesty Counter war dialing and scan infrastructures Understand the vulnerabilities of Windows, Linux, and Novell NetWare Prevent breaches in messaging systems, web applications, and databases Report your results and managing security changes Avoid deadly mistakes Get management involved with defending your systems As we enter into the digital era, protecting your systems and your company has never been more important. Don’t let skepticism delay your decisions and put your security at risk. With Hacking For Dummies, you can strengthen your defenses and prevent attacks from every angle!

View / Buy On Amazon


8 .) The Hacker Playbook 2: Practical Guide To Penetration Testing written by Peter Kim

Lists It Appears On:

  • Bonkers About Tech
  • Code Condo
  • Cyber 4 Geeks
  • Goodreads 2
  • Online Books Review
  • The Hack Today

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field. Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software. From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience. This second version of The Hacker Playbook takes all the best “plays” from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code. Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.

View / Buy On Amazon


7 .) Black Hat Python: Python Programming for Hackers and Pentesters written by Justin Seitz

Lists It Appears On:

  • Bonkers About Tech
  • Goodreads 2
  • Hackw0rm
  • Online Books Review
  • Solutions
  • The Hack Today
  • Yeah Hub

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you’ll explore the darker side of Python’s capabilities—writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more.

View / Buy On Amazon


6 .) CEH Certified Ethical Hacker All-in-One Exam Guide

Lists It Appears On:

  • Book Depository
  • Code Condo
  • Comps Mag
  • Cyber 4 Geeks
  • From Dev
  • Online Books Review
  • Tech Worm

Get complete coverages of all the objectives included on the EC-Council’s Certified the Ethical Hacker exam inside the this comprehensive resource. Written by an the IT security expert. The this the authoritative guide covers the vendor-neutral CEH exam in full detail. You’ll find learning objectives at the beginning of each chapter. exam tips. practice exam questions. and in-depth explanations. Designed to help you pass the exam with ease. this definitive volume also serves as an essential on-the-job reference.COVERS ALL EXAM TOPICS. INCLUDING: Introduction to ethical hackingCryptographyReconnaissance and footprintingNetwork scanningEnumerationSystem hackingEvasion techniquesSocial engineering and physical securityHacking web servers and applicationsSQL injectionViruses. trojans. and other …

View / Buy On Amazon


5 .) Hacking Exposed 7: Network Security Secrets and Solutions written by Joel Scambray

Lists It Appears On:

  • Bonkers About Tech
  • Book Depository
  • Goodreads
  • Goodreads 2
  • Lifewire
  • Online Books Review
  • SEC Zine

The world’s bestselling computer security book—fully expanded and updated “Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime.” —From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc.”For security to be successful in any company, you must ‘think evil’ and be attuned to your ‘real risk’…Hacking Expose 6 defines both.” —Patrick Heim, CISO, Kaiser Permanente”The definitive resource to understanding the hacking mindset and the defenses against it.” —Vince Rossi, CEO & President, St. Bernard Software”Identity theft costs billions every year and unless you understand the threat, you will be destined to be a victim of it. Hacking Exposed 6 gives you the tools you need to prevent being a victim.” —Bill Loesch, CTO, Guard ID Systems”This book is current, comprehensive, thoughtful, backed by experience, and appropriately free of vendor-bias-prized features for any security practitioner in need of information.” —Kip Boyle, CISO, PEMCO Mutual Insurance Company”The Hacking Exposed series has become the definitive reference for security professionals from the moment it was first released, and the 6th edition maintains its place on my bookshelf,” —Jeff Moss, Founder of the popular Black Hat Security ConferenceMeet the formidable demands of security in today’s hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested “attack-countermeasure” philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker’s extensive arsenal.New and updated material: New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits New wireless and RFID security tools, including multilayered encryption and gateways All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking Fully updated chapters on hacking the Internet user, web hacking, and securing code

View / Buy On Amazon


4 .) Rtfm: Red Team Field Manual written by Ben Clark

Lists It Appears On:

  • Bonkers About Tech
  • Cyber 4 Geeks
  • Goodreads 2
  • Hackw0rm
  • MIT Nick Security
  • Online Books Review
  • The Hack Today
  • Yeah Hub

View / Buy On Amazon


3 .) Metasploit: The Penetration Tester’s Guide written by David Kennedy

Lists It Appears On:

  • Bonkers About Tech
  • Code Condo
  • Comps Mag
  • Cyber 4 Geeks
  • From Dev
  • Goodreads 2
  • MIT Nick Security
  • Online Books Review
  • SEC Zine
  • Tech Worm
  • Use This Tip
  • Xeus Hack
  • Yeah Hub

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester’s Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors. Once you’ve built your foundation for penetration testing, you’ll learn the Framework’s conventions, interfaces, and module system as you launch simulated attacks. You’ll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks. Learn how to: Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You’ll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else’s to the test, Metasploit: The Penetration Tester’s Guide will take you there and beyond.

View / Buy On Amazon


2 .) The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy written by Patrick Engebretson

Lists It Appears On:

  • Bonkers About Tech
  • Book Depository
  • Code Condo
  • Comps Mag
  • Cyber 4 Geeks
  • From Dev
  • Goodreads 2
  • Hackw0rm
  • Online Books Review
  • SEC Zine
  • Tech Worm
  • The Hack Today
  • Use This Tip
  • Xeus Hack
  • Yeah Hub

The Basics of Hacking and Penetration Testing, 2nd Ed. serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed. You will learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack and Kali Linux, Google reconnaissance, MetaGooFil, DNS interrogation, Nmap, Nessus, Metasploit, the Social Engineer Toolkit (SET) , w3af, Netcat, post exploitation tactics, the Hacker Defender rootkit, and more. The book provides a simple and clean explanation of how to effectively utilize the tools and introduces a four-step methodology for conducting a penetration test or hack. You will be provided with the know-how required to jump start your career or gain a better understanding of offensive security. The book walks through each of the steps and tools in a structured, orderly manner, allowing readers to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process allows readers to clearly see how the tools and phases function and relate.

View / Buy On Amazon


1 .) Hacking: The Art of Exploitation written by Jon Erickson

Lists It Appears On:

  • Bonkers About Tech
  • Book Depository
  • Code Condo
  • Comps Mag
  • Cyber 4 Geeks
  • From Dev
  • Goodreads
  • Goodreads 2
  • Hackw0rm
  • Online Books Review
  • SEC Zine
  • Solutions
  • Tech Worm
  • The Hack Today
  • Use This Tip
  • Xeus Hack
  • Yeah Hub

A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as “hacking.” It shows how hackers exploit programs and write exploits, instead of just how to run other people’s exploits. This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks

View / Buy On Amazon



The 100+ Additional Best Books About Or Featuring Hacking



# Books Authors Lists
31 CEH v9 Book Depository
Comps Mag
32 Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman Goodreads
Goodreads 2
33 Hacker’s Challenge: Test Your Incident Response Skills Using 20 Scenarios Mike Schiffman Goodreads
Lifewire
34
Hacking: Ultimate Hacking for Beginners, How to Hack
Online Books Review
Use This Tip
35 Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground Kevin Poulsen Goodreads
Goodreads 2
36 Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research David Maynor Goodreads
Solutions
37 Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software Michael Sikorski Goodreads 2
MIT Nick Security
38 Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks Michal Zalewski Goodreads
Goodreads 2
39 The Art of Deception: Controlling the Human Element of Security Kevin D. Mitnick Goodreads
Goodreads 2
40 The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking Ronald L. Krutz Comps Mag
Goodreads
41 The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage Clifford Stoll Goodreads
Goodreads 2
42
The Hacker Playbook 3: Practical Guide to Penetration Testing
Book Depository
Hackw0rm
43
The Hardware Hacker: Adventures in Making and Breaking Hardware
Bonkers About Tech
Book Depository
44 The Soul of a New Machine Tracy Kidder Goodreads
Solutions
45 The Tangled Web: A Guide to Securing Modern Web Applications Michal Zalewski Goodreads
Goodreads 2
46
Unauthorised Access: Physical Penetration Testing For IT Security Teams
SEC Zine
Yeah Hub
47 We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency Parmy Olson Goodreads
Goodreads 2
48 A Complete H@cker’s Handbook Paul Day Goodreads
49 A Guide to Kernel Exploitation Book Depository
50
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Yeah Hub
51
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization
Yeah Hub
52 Alif the Unseen G. Willow Wilson Tor
53 Anonymous: Unmasking the Internet’s Most Powerful Collective Gregg Housh Goodreads
54
Applied Cryptography: Protocols, Algorithms, and Source Code in C
MIT Nick Security
55
Applied Network Security Monitoring: Collection, Detection and Analysis
Hacking Tutorials
56 Bayes Theorem: A Visual Introduction For Beginners Dan Morris Goodreads
57 Blue Team Handbook: Incident Response Edition
Bonkers About Tech
58 CEH: Official Certified Ethical Hacker Review Guide Comps Mag
59 Certified Ethical Hacker Exam Prep Comps Mag
60 CISSP All-in-One Exam Guide, 6th Edition MIT Nick Security
61 Coders at Work: Reflections on the Craft of Programming Peter Seibel Goodreads
62 Coding Freedom Book Depository
63 Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon Kim Zetter Goodreads
64 Counter Hack Reloaded Lifewire
65 CRACK99: The Takedown of a $100 Million Chinese Software Pirate David Locke Hall Goodreads
66 CUCKOO’S EGG MIT Nick Security
67 Cyber Mercenaries Book Depository
68 Cyber War : The Next Threat to National Security Hacker9
69 Cybercrime and Digital Forensics Book Depository
70 Cyberpunk: Outlaws and Hackers on the Computer Frontier Katie Hafner Goodreads
71 Cybersecurity and Cyberwar Book Depository
72 Cybersecurity for Beginners Book Depository
73 DarkMarket: Cyberthieves, Cybercops and You Misha Glenny Goodreads 2
74 Decision Trees and Random Forests: A Visual Introduction For Beginners: A Simple Guide to Machine Learning with Decision Trees Chris Smith Goodreads
75 Epic Win for Anonymous: An Online Army Conquers the Media Cole Stryker Goodreads
76 Exploding the Phone: The Untold Story of the Teenagers and Outlaws Who Hacked Ma Bell Phil Lapsley Goodreads 2
77 Fatal System Error: The Hunt for the New Crime Lords Who Are Bringing Down the Internet Joseph Menn Goodreads
78 Future Crimes: Everything Is Connected, Everyone Is Vulnerable, and What We Can Do About It Marc Goodman Goodreads
79 Fuzzing: Brute Force Vulnerability Discovery Yeah Hub
80 Gray Hat Python: Python Programming for Hackers and Reverse Engineers Justin Seitz Goodreads 2
81 Guards! Guards! (Discworld, #8; City Watch #1) Terry Pratchett Goodreads
82 Hack Attacks Revealed Lifewire
83 Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your Programming Kris Kaspersky Goodreads
84 Hacker Web Exploitation Uncovered [With CDROM] Marsel Nizamutdinov Goodreads
85 Hackers Book Depository
86 Hackers & Painters: Big Ideas from the Computer Age Paul Graham Goodreads 2
87 Hacking Etico 101: Como Hackear Profesionalmente En 21 Dias O Menos! Astudillo B. Karina Goodreads
88
Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions
Book Depository
89 Hacking S3crets Sai Satish Goodreads 2
90 Hacking the Hacker Book Depository
91
Hacking: Computer Hacking Beginners Guide How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack
Bonkers About Tech
92
Hacking: Computer Hacking, Security Testing, Penetration Testing, and Basic Security
Bonkers About Tech
93 Hacking: The Ultimate Beginners Guide SEO Free Tips
94 Hacktivist Alyssa Milano, Jackson Lanzing, and Colin Kelly Tor
95 Haker. Prawdziwa historia szefa cybermafii Kevin Poulsen Goodreads
96 Hash Crack: Password Cracking Manual
Bonkers About Tech
97 Homeland Cory Doctorow Goodreads 2
98
How to Beat The Police Interrogation: Learn Their Dirty Tricks & Tools
SEO Free Tips
99
How to Hack Like a PORNSTAR: A step by step process for breaking into a BANK (Hacking the planet Book 1)
Cyber 4 Geeks
100
Incognito Toolkit: Tools, Apps, and Creative Methods for Remaining Anonymous, Private, and Secure While Communicating, Publishing, Buying, and Researching Online
SEO Free Tips
101 Intercept Book Depository
102 Julian Assange – The Unauthorised Autobiography Julian Assange Goodreads
103
Low Tech Hacking: Street Smarts for Security Professionals
SEC Zine
104 Make Your Own Neural Network: An In-depth Visual Introduction For Beginners Michael Taylor Goodreads
105 Make Your Smartphone 007 Smart SEO Free Tips
106 Masters of Doom: How Two Guys Created an Empire and Transformed Pop Culture David Kushner Goodreads
107 Network Forensics Book Depository
108 Network Security Assessment 2nd Edition
Bonkers About Tech
109 Neuromancer William Gibson Redital Group
110
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Bonkers About Tech
111
NO PLACE TO HIDE Edward Snowden, the NSA, and the U.S. Surveillance State
The Nation
112 No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing Johnny Long Goodreads 2
113 Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems Chris Sanders Goodreads
114 Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation Bruce Dang Goodreads 2
115 Principles of Cybercrime Book Depository
116
Professional Penetration Testing, Second Edition: Creating and Learning in a Hacking Lab
Yeah Hub
117
Red Team: How to Succeed By Thinking Like the Enemy
Hacking Tutorials
118 Reversing: Secrets of Reverse Engineering Eldad Eilam Goodreads 2
119
RHCSA/RHCE Red Hat Linux Certification Study Guide
Code Condo
120 Saving Gary McKinnon: A Mother’s Story Janis Sharp Goodreads
121 Secrets and Lies: Digital Security in a Networked World Bruce Schneier Goodreads 2
122
Secrets to Becoming a Genius Hacker: How to Hack Smartphones, Computers & Websites for Beginners –
SEO Free Tips
123 Snow Crash Neal Stephenson Redital Group
124
SPIES FOR HIRE The Secret World of Intelligence Outsourcing
The Nation
125 Steal This Computer Book 4 Lifewire
126 Stealing the Network: How to Own a Continent Ryan Russell Goodreads
127 Stealing the Network: How to Own the Box Ryan Russell Goodreads
128 Stealing the Network: The Complete Series Collector’s Edition, Final Chapter, and DVD: The Complete Series Johnny Long Goodreads
129 The Accidental Billionaires: The Founding Of Facebook Ben Mezrich Goodreads
130 The Antivirus Hacker’s Handbook Book Depository
131 The Art of Invisibility: The World’s Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data Kevin D. Mitnick Goodreads 2
132 The Best of 2600: A Hacker Odyssey Emmanuel Goldstein Goodreads
133 The Car Hacker’s Handbook Book Depository
134 The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary Eric S. Raymond Goodreads
135 The Girl in the Spider’s Web David Lagercrantz Goodreads 2
136 The Girl Who Kicked the Hornet’s Nest Stieg Larsson Goodreads 2
137 The Girl Who Played with Fire Stieg Larsson Goodreads 2
138 The Math of Neural Networks Michael Taylor Goodreads
139 The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System Bill Blunden Goodreads
140 The Unrevealed Secrets of Hacking and Cracking Hacker9
141
Think Python: How to Think Like a Computer Scientist
Solutions
142 This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World’s Information Andy Greenberg Goodreads 2
143 Warcross Marie Lu Goodreads 2
144 Web Hacking 101 Hacking Tutorials
145 Zer0es Chuck Wendig Redital Group


25 Best Books About Hacking Sources/Lists



Source Article
Bonkers About Tech 20 Best Hacking Books To Learn Ethical Hacking In 2018
Book Depository Computer Fraud & Hacking Books | Book Depository
Code Condo 8 Popular Books To Learn Ethical Hacking – Codecondo
Comps Mag Top 10 Best Hacking Books For Learn Hacking To Become Hacker 2018
Cyber 4 Geeks 7 Best Hacking Books to Learn Hacking – Cyber4Geeks
From Dev 6 Best Hacking Books You Must Read to be a Hacker | FromDev
Goodreads Hacker nonfiction (56 books) – Goodreads
Goodreads 2 Popular Hacking Books – Goodreads
Hacker9 Best Hacking & Security Books (updated) you Must Read! – Hacker9
Hacking Tutorials The Best Hacking Books 2018 – Hacking Tutorials
Hackw0rm 5 Best Hacking Books of 2018 – Hackw0rm
Lifewire Top Hacker Technique and Defense Security Books – Lifewire
MIT Nick Security 9 Books to follow if you want to become a ethical hacker
Online Books Review Best Ethical Hacking books to learn hacking | Online Books Review
Redital Group 6 Mind Blowing Hacking Books – Redital Book Club
SEC Zine The Ten Best Books on Hacking – Security magazine – Cyber Security
SEO Free Tips 211 Free and Best Ethical Hacking Books for Beginners 2018
Solutions 10 Best books about hacking 2018 – Softonic Solutions
Tech Worm 5 Best Hacking Books You Must Read To Be A Hacker » TechWorm
The Hack Today 5 Best Hacking Books of 2017 – The Hack Today
The Nation 5 Books: Gabriella Coleman’s Best Reads on Hacking | The Nation
Tor Five Books Featuring Heroic Hackers | Tor.com
Use This Tip 5 Best Hacking Books to Learn Hacking From Basics – UseThisTip
Xeus Hack The Top 5 Books for Hackers in 2017 | Hacking Tutorials by Xeus
Yeah Hub Best 16 Penetration Testing Books – 2018 Update – Yeah Hub
A.M. Anderson

Share
Published by
A.M. Anderson

Recent Posts

The Best Books of 2023 – Science Fiction And Fantasy (A Year-End List Aggregation)

"What are the best Science Fiction And Fantasy books released in 2023?" We looked at…

3 months ago

The Best Books of 2023 – Graphic Novels And Comics (A Year-End List Aggregation)

"What are the best Graphic Novels And Comics books released in 2023?" We looked at…

3 months ago

The Best Books of 2023 – Science And Nature (A Year-End List Aggregation)

"What are the best Science And Nature books released in 2023?" We looked at 278…

3 months ago

The Best Books of 2023 – Mystery, Horror, and Thriller (A Year-End List Aggregation)

"What are the best Mystery, Horror, and Thriller books released in 2023?" We looked at…

3 months ago

The Best Books of 2023 – Nonfiction (A Year-End List Aggregation)

"What are the best Nonfiction books released in 2023?" We looked at 428 of the…

3 months ago

The Best Books of 2023 – Fiction & Literature (A Year-End List Aggregation)

"What are the best Fiction & Literature books released in 2023?" We looked at 448…

3 months ago