Buy New
$9.00
Qty:1
  • List Price: $10.00
  • Save: $1.00 (10%)
FREE Shipping on orders over $35.
In Stock.
Ships from and sold by Amazon.com.
Gift-wrap available.
Add to Cart
Want it Monday, April 21? Order within and choose Two-Day Shipping at checkout. Details
Trade in your item
Get a $2.33
Gift Card.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more

Rtfm: Red Team Field Manual Paperback – February 11, 2014


Amazon Price New from Used from Collectible from
Paperback, February 11, 2014
"Please retry"
$9.00
$9.00 $37.13

Frequently Bought Together

Rtfm: Red Team Field Manual + The Hacker Playbook: Practical Guide To Penetration Testing + Basic Security Testing with Kali Linux
Price for all three: $54.07

Buy the selected items together

NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Paperback: 96 pages
  • Publisher: CreateSpace Independent Publishing Platform; 1.0 edition (February 11, 2014)
  • Language: English
  • ISBN-10: 1494295504
  • ISBN-13: 978-1494295509
  • Product Dimensions: 8.4 x 5.4 x 0.4 inches
  • Shipping Weight: 1.4 ounces (View shipping rates and policies)
  • Average Customer Review: 4.7 out of 5 stars  See all reviews (38 customer reviews)
  • Amazon Best Sellers Rank: #774 in Books (See Top 100 in Books)

Customer Reviews

4.7 out of 5 stars
5 star
29
4 star
6
3 star
2
2 star
1
1 star
0
See all 38 customer reviews
Very handy reference for those interested in pen testing.
Matthew
Overall, it's a fascinating and tantalizing read and a MUCH better love story than "Twilight".
The Doctor
I didnt really know much about the book and had never heard of a red team.
Byron Creek

Most Helpful Customer Reviews

18 of 18 people found the following review helpful By Bill Sempf on March 16, 2014
Verified Purchase
These are all fun and stuff, but there needs to be a few actual reviews.

This book is essentially a decade's worth of notes from an experienced network security engineer or pen tester. It looks like someone published an evernote notebook. Formatting is inconsistent and at times confusing. There is a fair amount of duplication. Placeholders are inconsistent. There is no descriptive text or explanatory notes. It is a list of commands, and nothing more.

If you are an experienced command line user, it is pretty awesome.

That said, with around 2000 commands in the book, there in exactly one page of index. It is impossible to find anything. If it is windows, that's great, narrows things down to about 30 pages that you have to flip through to find what you want. Even though I often know exactly what I am looking for, I still end up flipping through nearly every page in the book to find it. That is frustrating.

It's true that everything here can be found elsewhere online, but that's a lot like saying that a thesaurus is just a list of words that you can find online. The proper formatting of actually useful DOS net commands, for instance, is a great example of why the book is more useful than a Google search.

I'd say this is pretty much a must-own book for anyone that has to work with computers. If you are in charge of security or testing, even better. I wish it was better indexed, but can't have everything. Certainly worth the money.
1 Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
8 of 8 people found the following review helpful By Byron Creek on March 12, 2014
Verified Purchase
I didnt really know much about the book and had never heard of a red team. I read some of the hax0r reviews and it sounded pretty cool. Cool is right. This book packs so much knowledge of command line networking and various tools such as upgrading a powershell to meterpreter, remote file transfers, backdoor scripting and more. The book is simple to read: it is only command line arguments.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
8 of 9 people found the following review helpful By Matthew on March 12, 2014
Verified Purchase
Don't let the reviews scare you off. This book rocks.

~90 pages of commands for Windows, Linux, Powershell etc. Very handy reference for those interested in pen testing.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By Amazon Customer on March 24, 2014
I have never written a review, but after a co worker brought this in, and i looked it over I instantly put it on my 'to buy list' (and will have in my hands very soon).

Many of the items i constantly google for, or carry around in a beat up spiral bound notebook, can be found in this book. Somewhere between 30-50 percent located in a tiny book. Plus stuff i don't currently use, but may at any given moment.

The stuff that is missing, and would be HIGHLY useful (hope the author is reading), would be an expansion on the database section to include common SQL injection (union based / error based) and a section on other web based attacks like XSS (including <script>, <img>, body.onload, etc.).

As a follow up to those sections, methods of obfuscation (read filter evasion) are also highly needed for web based pen testing (a conversion chart or two for ascii -> url/hex/etc.)

Extremely impressed otherwise, and will soon be toting this book instead of my personal notes, very soon!

4/5 only because web based attacks were grossly overlooked.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
4 of 5 people found the following review helpful By The Doctor on April 3, 2014
Verified Purchase
This book is a little creepy - it has it all - stalking, surveillance, approaching your target, and taking command. It's sort of "Fifty Shades of Grey" meets basic shell scripting.

It starts with great Linux pickup lines but can be a little risque as it starts with mount commands right on the first page! Talk about aggressive! It also shows you how to "cover your tracks" if you're a "one night stand" kind of hacker - don't ping me, I'll ping you.

It even gets into inter-operating system relationships and various other things that are most likely still illegal south of the Mason-Dixon line.

Overall, it's a fascinating and tantalizing read and a MUCH better love story than "Twilight".

Seriously - this is a great "cheat sheet" kind of book for pen testing and general red-team activities.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By BabyDoll on March 30, 2014
Verified Purchase
it is a great quick reference book for many tools. it saves me from having to look up information in 50 different books. it will stay in my kit bag.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By NetSecPro on March 24, 2014
Verified Purchase
I'm not sure what the bad reviews are all about. They complain about the text not being readable, no table of contents or the commands not being categorized. Totally false. The book is of great quality, the text absolutely normal, it has a table of contents and an Index at the end of the book. Also, all the commands are categorized, such as Windows Utility Commands, Windows Network Commands, Windows Remote Commands, etc. etc.. Table of Contents:
Nix, Windows, Networking, Tips and Tricks, Tool Syntax, Web, Databases, Programming, Wireless, References, Index.

You will find Nmap commands, SQLMAP, Powershell, Google Hacking, VPN, Putty, MS-SQL, Postgres, Tunneling... so many more to cover it here.

All I can think of is that someone got an early copy of this book, a very bad one...?? That's where the bad review came from? Or, someone with bad intentions.

Trust me: this is the best field manual you will ever find. Excellent resource.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Product Images from Customers

Most Recent Customer Reviews

Search
ARRAY(0xa01f1df8)