
Enjoy fast, free delivery, exclusive deals, and award-winning movies & TV shows with Prime
Try Prime
and start saving today with fast, free delivery
Amazon Prime includes:
Fast, FREE Delivery is available to Prime members. To join, select "Try Amazon Prime and start saving today with Fast, FREE Delivery" below the Add to Cart button.
Amazon Prime members enjoy:- Cardmembers earn 5% Back at Amazon.com with a Prime Credit Card.
- Unlimited Free Two-Day Delivery
- Streaming of thousands of movies and TV shows with limited ads on Prime Video.
- A Kindle book to borrow for free each month - with no due dates
- Listen to over 2 million songs and hundreds of playlists
- Unlimited photo storage with anywhere access
Important: Your credit card will NOT be charged when you start your free trial or if you cancel during the trial period. If you're happy with Amazon Prime, do nothing. At the end of the free trial, your membership will automatically upgrade to a monthly membership.

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Advanced Infrastructure Penetration Testing
Purchase options and add-ons
- ISBN-101788624483
- ISBN-13978-1788624480
- PublisherPackt Publishing
- Publication dateFebruary 23, 2018
- LanguageEnglish
- Dimensions7.5 x 0.81 x 9.25 inches
- Print length396 pages
Similar items that may deliver to you quickly
Editorial Reviews
About the Author
Chiheb Chebbi is an InfoSec enthusiast with experience in various aspects of Information Security focusing on the investigation of advanced cyber attacks and researching cyber espionage and APT attacks. Chiheb is currently pursuing an Engineering degree in Computer Science at TEK-UP university in Tunisia. His core interest lies in infrastructure penetration testing, deep learning, and malware analysis. In 2016 he was included in the Alibaba Security Research Center Hall Of Fame. His talk proposals were accepted by DeepSec2017, Blackhat Europe 2016, and many world-class information security conferences
Product details
- Publisher : Packt Publishing (February 23, 2018)
- Language : English
- Paperback : 396 pages
- ISBN-10 : 1788624483
- ISBN-13 : 978-1788624480
- Item Weight : 1.5 pounds
- Dimensions : 7.5 x 0.81 x 9.25 inches
- Best Sellers Rank: #6,277,840 in Books (See Top 100 in Books)
- #1,939 in Computer Operating Systems (Books)
- #2,998 in Computer Networking (Books)
- #4,456 in Computer Network Security
- Customer Reviews:
About the author

Discover more of the author’s books, see similar authors, read book recommendations and more.
Customer reviews
- 5 star4 star3 star2 star1 star5 star40%15%0%0%45%40%
- 5 star4 star3 star2 star1 star4 star40%15%0%0%45%15%
- 5 star4 star3 star2 star1 star3 star40%15%0%0%45%0%
- 5 star4 star3 star2 star1 star2 star40%15%0%0%45%0%
- 5 star4 star3 star2 star1 star1 star40%15%0%0%45%45%
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonTop reviews from the United States
There was a problem filtering reviews. Please reload the page.
- Reviewed in the United States on April 7, 2018This is one of the most horrible books that I have ever read. Even class-text books that teach kids basic computer security have better information than this. The author seems to have no idea of what he is talking about. Every chapter goes into very high level about every topic including the topics of exploitation which is what this book intends to sell. I was really excited when I first looked at the table of contents in the book as it seemed promising covering topics like Docker exploitation, VPN exploitation, etc. However if you read any of these chapters you will soon realize that chapters dont even cover the basics of these technologies correctly. I usually dont like to be such harsh critic, but honestly the book is not even worth 1 dollar in my opinion. Its a combination of everything that we can find for free and still better arranged and explained else where on the Internet. Overall it was extremely disappointing
- Reviewed in the United States on March 25, 2018Even I have no idea about anything security, it was easy for me to understand the core concepts. I would recommend it :)
- Reviewed in the United States on October 12, 2020The worst book that I have ever read in my life. This book is full of definitions and it doesn't even deserve to get one star. If you are still interested to read, the best way would be "Copy each line from table of contents and google for definitions".
- Reviewed in the United States on October 28, 2021Writer just touch the area, not going deep inside of matter. And even in touching there is no practical and useful stuff. In forums could be found more and correct information on subject.
- Reviewed in the United States on March 5, 2019After scouring numerous resources, taking online and instructor-led training, and speaking to hundreds of professional penetration testers, this has been the only resource that properly covers Active Directory Exploitation.
There are books, such as Becoming the Hacker (best for web app penetration testing), that I would recommend to build on the foundation this book sets for some of the other topics. I might also compare this to Mastering Kali Linux for Advanced Penetration Testing, Third Edition (best for physical penetration testing). However, this book is unique in a few key ways.
1) This book mentions PowerView, an essential suite for Windows Server Domain security testing. Unlike the other books that do mention PowerView, this book goes into detail about the intrinsics and internals.
2) The book levers a technique that we've seen elsewhere, SPN Scanning, but simplifies it and consolidates the data gathering element in a simple command-by reference. It introduced SPN Scanning earlier than other publications and trainings. SPN Scanning is key to remaining under the radar yet able to pivot rapidly and cleanly.
3) Although it could already use a refresh, the section on Continuous Integration penetration testing was prescient. No other books cover this so prominently, yet they should.
Overall, besides the 2 books I mentioned that compete with this title, it's one of the best books on Infrastructure Penetration Testing and the current best publication on penetrating Active Directory / Windows Server technologies. I would definitely recommend all 3, especially in combination.
Top reviews from other countries
- David SmithReviewed in the United Kingdom on August 15, 2018
1.0 out of 5 stars waste of time
There was absolutely nothing advanced about this book. No good!
- NakulReviewed in India on August 21, 2018
1.0 out of 5 stars Very Bad Book
The book does not cover the details of anything in detail. Its only good if you don't know if that could happen .
I won't recommend it to anyone . Waste of money .....
- Parteek sharmaReviewed in India on April 5, 2018
5.0 out of 5 stars Five Stars
It is excellent and a must read