EDIT: As of 11/24/2024 - This post has been restored pretty much "as is" for now.
I'll be back with more updates soon.
Click here or on the book cover above to find it on amazon.
Researching Recon or Reconnaissance Tactics, Techniques and Procedures (TTP).
Click here to see this review on amazon.com
This is the exact review I left on Amazon.com. I’m sharing it here because this is the foundation of an extended book review project that I intend to build upon over time. I hope you’ll join me on this journey and dive deeper with me to learn more about investigating threats via security logs and how to read and parse them.
And without further ado, I proudly present to you, the review…
I’ve read many dedication pages in various books but this one was different. The author dedicated this book to us, the readers, with encouragement to stay committed, work hard, focus, and never give up. Those were the right words at precisely the right time for me. Thank you.
As for the actual content, I am very excited to go on this journey into the “dark arts” of Reconnaissance for Ethical Hackers. The author provides many practical hands-on TTPs or Tactics, Techniques, and Procedures like deploying an OSINT VM in your personal lab (to avoid legal issues), setting up Kali Linux, anonymizing your network traffic, applying DNS recon and so much more! If you want more, (like I did) then buy this book!
In Conclusion…
Hopefully you’ll join me on this learning journey and check back in with me later to see the updates.
If you made it this far you’re the real MVP! 🏆
Thank you for reading, I hope you found value in my review. 🎁