Hacker News Comments on
Rtfm: Red Team Field Manual
·
3
HN comments
- This course is unranked · view top recommended courses
Hacker News Stories and Comments
All the comments and stories posted to Hacker News that reference this book.hmm this content seems pretty dated. If they're looking at internal network enumeration, then it's missing most of the modern tools, if it's looking at external enumeration then it's not great as most of the ports they refer to are unlikely to be exposed externally...If you want more up to date material in this kind of field, something like the Red Team Field Manual (https://www.amazon.co.uk/Rtfm-Red-Team-Field-Manual/dp/14942...) or "Advanced penetration testing" https://www.amazon.co.uk/gp/product/B06XCKTKK8/ref=oh_aui_d_... could be worth looking at.
yeah, it's a reference, if anything. not a practical "read" per se, but hey A+ for effort.i get by using 4-5 commands and neovim, it's plenty for my sysadmin needs.
if you want a short 30page read that has most things, there's the red team field manual! i recommend having a copy
amazon link > Rtfm: Red Team Field Manual: https://www.amazon.com/Rtfm-Red-Team-Field-Manual/dp/1494295...
it's a no frills collection of commands grouped under topic/use case. command description is left to the user to lookup using the manpages.
Does anyone actually refer to a "cheatsheet" when they are hacking? Or do they just use Google? It makes me laugh to think someone has some of this stuff printed by their desk for an emergency. For example, "gcc -o exploit exploit.c".Also, this looks like a ripoff of http://www.amazon.com/Rtfm-Red-Team-Field-Manual/dp/14942955....
⬐ yeowMengI am not a pen tester, but I love paper cheat sheets on my desk. Currently: gdb, emacs, bash, operator precedance in C, register names/use in x86.⬐ unethical_banAs recently as a few years ago I had a VI cheatsheet taped to my cubicle. For quick go-to commands when you're forgetful, things like this can be handy.⬐ spydumI am not a metasploit ninja, my job is mostly in design and defending systems. However, on occasion I'll need to demonstrate a pivot or exploit a common vuln to make a point to a DEV team. I might bust out the cheatsheet because that tool isn't I my muscle memory.