One of the most popular and most asked questions since I’ve started this blog is if I can recommend some good hacking books to read for beginners and more experienced hackers and penetration testers. In this article I want to highlight some hacking books and InfoSec books that I personally liked that cover subjects such as ethical hacking, penetration testing, web application penetration testing and other InfoSec related subjects. In addition to college degrees, certifications, hacking courses, taking up challenges and practical training, books are an invaluable source of information to keep your knowledge up-to-date and acquire new skills. Whether you’re a beginner in the field of InfoSec or a seasoned professional, mastery of new skills will open up many doors and allow you to progress in your career faster.
The secret of becoming a (better) penetration tester, bug bounty hunter or IT professional is to not only focus on penetration testing books but also read books on related subjects such as: Networking, programming, exploit development, web applications, network security monitoring and other IT subjects. Having at least a little theoretical knowledge about these subjects helps you a lot to look at information security from different angles and perspectives. For this reason I will not only list hacking books in this article but also books on related subjects that I deemed important enough to read. In my opinion every serious IT professional should be reading at least a book per month and I hope that this article will help you discover your next InfoSec book to read.
Please note that the listings of the books is not a ranking but a mere overview of hacking books that I recommend to the Hacking Tutorials readers. I will update this article on a regular basis with new books. Would you like to see a specific book added to the list or even your own book? Please leave a comment below and I will add it to the list.
Finally, I have included Amazon affiliate links underneath each book review which will generate a small commission for Hacking Tutorials when buying the book through this link. If you prefer to not buy the book through these links, please browse to Amazon and use the search function to lookup the book.
Penetration Testing: A Hands-On Introduction to Hacking
The first book I would like to recommend is a hacking book that has helped many people to make their first steps into ethical hacking and penetration testing. Penetration Testing: A Hands-On Introduction to Hacking is written by Georgia Weidman and is a good book for anyone new to the subjects as it generally focuses on beginners. The author of this book covers many different subjects such as setting up a lab to enumeration, exploitation, mobile hacking and a lot more. What I personally like about this book is that the author explains every step in the process in detail and also relates it to her wide experience in the field as a penetration tester. So if you’re new to penetration testing without prior experience, this book is a great place to start an exciting journey!
According to the author on Twitter she’s currently writing an updated V2 version of this book, follow her for updates! While this book is still greatly appreciated by many (including me) and helped many people making their first steps into the field of penetration testing, some parts of the book (including the URLs) are a bit outdated. If you’re fine with this like us, make sure that you check the update section for this book on the authors website. Otherwise I would recommend to wait until the updated V2 of this book is released.
The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws 2nd Edition
The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws
Advanced Penetration Testing: Hacking the world’s most secure networks
Advanced Penetration Testing: Hacking the World’s Most Secure Networks
The Shellcoder’s Handbook: Discovering and Exploiting Security Holes 2nd Edition
The Shellcoder’s Handbook: Discovering and Exploiting Security Holes
Red Team: How to Succeed By Thinking Like the Enemy
Red Team: How to succeed by thinking like the enemy is written by national security expert Micah Zenko. In this book the author provides in-depth information about the work of red teams, how they operate, the best practices and most common pitfalls, and effective applications of the modern-day Devil’s Advocates approach. At first you might be wondering why I list this book in a hacker/InfoSec book overview as this book does not cover any technical subjects or red teaming tools. But, when you’ve read this book you’ve learned how best practices of red teaming can yield impressive results by thinking like the enemy and considering alternate analysis to reveal weaknesses in systems and processes. What I also like about this book is that the author covers many business scenarios and shortcomings from his experience that anyone who has worked in mid-size or large organizations can relate to. The book also includes a lot of examples of effective and ineffective red teaming exercises and a clear lessons learned review from these exercises. So if you’re looking for a great introduction to red teaming and you’re interested in the history of red teaming, the theory behind it, best practices and pitfalls, critical thinking and alternate analysis, and how to operate red teams, this book is a must read.
Red Team: How to Succeed By Thinking Like the Enemy
Update: Some good advice from the author in response to this article:
Web Hacking 101
Applied Network Security Monitoring: Collection, Detection and Analysis
Finally the book is divided into three primary sections (Collection, Detection, & Analysis) that takes you through all stages of the NSM process. Each sections contains practical examples and hands-on coverage of the tools needed which makes it very easy to learn the practical side of NSM alongside reading the book. The book provides thorough hands-on coverage of Snort, Suricata, Bro-IDS, SiLK, PRADS, and many others tools.
Applied Network Security Monitoring: Collection, Detection, and Analysis
More Hacking Books
In the upcoming weeks I will update this article with new books I’ve read that I can recommend to hackers and pentesters. If you would like to suggest a specific book to read and review, please leave a comment so that I can look into it.
18 Comments
Hacking Exposed Web Applications 3
Thank you for your recommendation!
Attacking Network Protocols: A Hacker’s Guide to Capture, Analysis, and Exploitation: https://www.amazon.com/Attacking-Network-Protocols-Analysis-Exploitation/dp/1593277504/
The Tangled Web: A Guide to Securing Modern Web Applications: https://www.amazon.com/Tangled-Web-Securing-Modern-Applications/dp/1593273886/
Network Security Assessment: Know Your Network: https://www.amazon.com/Network-Security-Assessment-Know-Your/dp/149191095X/
In my opinion all excellent sources for Network and Webhacking.
Tangled web is a good addition after reading the web application book!
I have no book to recommend you but I am interested in study more and more books related to hacking please update your article as soon as possible.
Exactly , I agree with YOU …
The hacker playbook 3
I’m currently reading this book and will add it to the list soon + a full review. Thanks for the recommendation!
Metasploit: The Penetration Tester’s Giude
Awesome post! I am in school right now for Network security and computer forensics, although I will say that I am way behind and not sure honestly if I could ever catch up. Its a two year and I have no prior experience and am pretty old! But I appreciate sites like yours that give great advice and insight into ethical hacking. Just wish I would of started much much earlier.
Great to read that you like the post so much! Just work hard and you will catch up!
Good luck and you can always contact me on Twitter if you have questions related to the content (or just post them here).
Best,
Hacking Tutorials
Thank you for your recommendation
Thanks for the informations
Just want to ask
this is the first time for me to study hacking
since the computer science changes so fast is it good to start from book written in 2014
Good question!
As mentioned in the article some parts of the book are a bit outdated, especially when it comes to tools, but it’s still a great book that perfectly describes techniques and methodology.
If you’re looking for more web app pentesting books Web Hacking 101 is more recent.
Any book about wifi and Internet hacking?
Yes same as above comment. Do you know any books/ courses for advanced WiFi cracking? I am intermediate level in which I can crack almost all wep but not many wpa/wpa2 and I want to be able to consistently crack them. Thanks!
Thanx a lot
This article is very helpful for d begginrs.
Now i m in 11th.
Completed 2 computer languages. So a bit interested in this field.
I will surely read yr recommend books.
Hi, I have a question
Are these books still useful to 2021?
Hi, I think most of them are!