The Best Hacking Books 2019

One of the most popular and most asked questions is if we can recommend some good hacking books to read for beginners, experienced hackers, and penetration testers. In this article, we want to highlight some hacking and InfoSec books that we personally like.
good hacking books, hacking book, good hacking book, hacking book
These books cover subjects such as ethical hacking, penetration testing, web application penetration testing and other InfoSec related subjects.
good hacking books, hacking book, good hacking book, hacking book
In addition to college degrees, certifications, hacking courses, taking up challenges and practical training, books are an invaluable source of information to keep your knowledge up-to-date and acquire new skills. Whether you’re a beginner in the field of InfoSec or a seasoned professional, mastery of new skills will open up many doors and allow you to progress in your career faster.
good hacking books, hacking book, good hacking book, hacking book
The secret of becoming a (better) penetration tester, bug bounty hunter or IT professional is to not only focus on penetration testing books but also read books on related subjects such as Networking, programming, exploit development, web applications, network security monitoring, and other IT subjects.
good hacking books, hacking book, good hacking book, hacking book
Having at least a little theoretical knowledge about these subjects helps you a lot to look at information security from different angles and perspectives. For this reason, we will not only list hacking books in this article but also books on related subjects that are deemed important enough to read.
good hacking books, hacking book, good hacking book, hacking book
Every serious IT professional should be reading at least a book per month and, hopefully, this article will help you discover your next InfoSec book to read.

Please note that this list is not a ranking but a mere overview of books about hacking that are recommended for those who enjoy reading our hacking tutorials.

Penetration Testing: A Hands-On Introduction to Hacking
good hacking books, hacking book, good hacking book, hacking book
good hacking books, hacking bookThe first book on our list is a hacking book that has assisted a lot of people to make their beginning in the realm of ethical hacking and penetration testing.  This book is suitable for those new to the entire subject since it focuses on beginner topics. Written by Georgia Weidman, Penetration Testing: A Hands-On Introduction to Hacking covers numerous issues, including how to set up a lab to enumeration, exploitation, mobile hacking, and much more. The author is very good at explaining every step of a process in great detail while relating it to her vast experiences in the field as a penetration tester.
good hacking books, hacking book, good hacking book, hacking book
According to the author’s Twitter feed, she’s currently writing an updated V2 version of this book, so follow her for updates! While this book is still greatly appreciated by many and helped many people enter into the field of penetration testing, some parts of the book (including the URLs) are a bit outdated. If you’re fine with this, make sure that you check the update section for this book on the author’s website. Otherwise, you may want to wait until the updated V2 of this book is released.
good hacking books, hacking book, good hacking book, hacking book
*If you are like us at The Hidden Wiki, you can just skip buying it on Amazon and download it from The Pirate Bay by copying and pasting this link into your torrent download application.


The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws 2nd Edition

good hacking books, hacking bookThis fantastic web app hacking book is a must-read for anyone interested in web application penetration testing and covers everything you need to know about this subject. The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws 2nd Edition (Amazon Books link) is written by the founder of Portswigger, which is the company behind the popular security testing & scanning tool called Burp Suite.

This book is a step-by-step guide on how to test the security of web applications from start to finish. It explains different web technologies, how to exploit them and how to defend against the attack in particular.
good hacking books, hacking book, good hacking book, hacking book
Furthermore, this book covers the very basics a web application penetration tester needs to know in depth, such as how the HTTP protocol works in order to get a better understanding of communications between a web server and visitor which helps in understanding attacks and defense.

*Unfortunately, there is no torrent available for this particular book. But don’t worry, we at The Hidden Wiki will update this post with the torrent link if one comes available.


Advanced Penetration Testing: Hacking the World’s Most Secure Networks

good hacking books, hacking bookIn 2017, the author of this review read Advanced Penetration Testing: Hacking the World’s Most Secure Networks. This book is not for beginners, though it can put everything else you learned as a beginner into a much better perspective.

This book covers complex attack simulations, as well as Advanced Persistent Threat (APT) modeling that goes far beyond techniques in previous tutorials, namely the use of Metasploitable and vulnerability scanners. It goes into subjects that include social engineering, highly secured networks, malware, and creating and setting up C2 servers and their structures. The book even discusses advanced data exfiltration methods.

Each chapter describes in great detail APT modeling against organizations in specific industries such as banks, pharmaceutical companies, and hospitals. By breaking down APT modeling by different sectors, you get a clear insight on how each sector has unique assets they want to protect, how they go about protecting those assets, and who they intend to protect them from.

The author is very experienced in penetration testing and is a red teamer. Thus, their examples and contextual aspects provided come straight from the field.
good hacking books, hacking book, good hacking book, hacking book
*Unfortunately, there is no torrent available for this particular book. But don’t worry, we at The Hidden Wiki will update this post with the torrent link if one comes available.


The Shellcoder’s Handbook: Discovering and Exploiting Security Holes 2nd Edition

good hacking books, hacking bookA group of top-secret security experts wrote this book. It covers everything an aspiring hacker needs to know, including how to locate holes in a network, operating system, and applications. You’ll be studying the basic building blocks of security bugs, the heap, the stack, source code, as well as anything and everything else.
good hacking books, hacking book, good hacking book, hacking book
Before you think about diving into this book, you should have basic programming and IT knowledge. However, this may not even be enough because the authors expertly wrote this book, and without much of an introduction. Thus, the book is hard to read if you haven’t enough expertise to comprehend things without explanations. To put it as simple as possible: this book is not a joke.

If you have a good understanding of programming concepts, x86, assembly, exploit development and want to learn more about various types of advanced exploits like stack overflow, a heap overflow and exploit development, Return Oriented Programming, Fuzzing, ASLR/DEP handling and a lot more, this book is for you. If you have a less technical knowledge and you’re a beginner on these subjects you’ll probably end up researching a lot of this stuff as a side effect of reading this book – but that isn’t a bad idea, either.

*Unfortunately, there is no torrent available for this particular book. But don’t worry, we at The Hidden Wiki will update this post with the torrent link if one comes available.


Red Team: How to Succeed By Thinking Like the Enemy

good hacking books, hacking bookRed Team: How to Succeed by Thinking Like the Enemy is written by national security expert Micah Zenko. In this book, the author provides in-depth information about the work of red teams, how they operate, the best practices and most common pitfalls, and effective applications of the modern-day Devil’s Advocates approach.

This book does not cover any technical subjects or red teaming tools.

But, when you’ve read this book you’ve learned how best practices of red teaming can yield impressive results by thinking like the enemy and considering alternate analysis to reveal weaknesses in systems and processes. A good thing about this book is that the author covers many business scenarios and shortcomings from his experience that anyone who has worked in mid-size or large organizations can relate to.
good hacking books, hacking book, good hacking book, hacking book
The book also includes a lot of examples of effective and ineffective red teaming exercises and clear lessons learned review from these exercises. So if you’re looking for a great introduction to red teaming and you’re interested in the history of red teaming, the theory behind it, best practices and pitfalls, critical thinking and alternate analysis, and how to operate red teams, this book is a must-read.

*Unfortunately, there is no torrent available for this particular book. But don’t worry, we at The Hidden Wiki will update this post with the torrent link if one comes available.


Web Hacking 101

good hacking books, hacking bookWeb Hacking 101 is written by Peter Yaworski (with a foreword by HackerOne Co-Founders Michiel Prins and Jobert Abma) and explains common vulnerabilities found in web applications using publicly disclosed vulnerability reports on bug bounty programs. The book covers vulnerability reports on Cross-site scripting (XSS), Cross-site request forgery (CSRF), Remote Code Execution (RCE) and many more vulnerability types. Each report is analyzed by the author and includes details about the vulnerability, a clear description and the reward that was paid.

With this book, you won’t just learn about the vulnerabilities and how they were exploited but also their context, the impact and how to recognize them on your own bug bounty hunts. Finally, the book also provides an overview of bug bounty platforms, tools, blogs and some cheat sheets to get started with bug bounty hunting right away.

The book is available at Leanpub.com for as low as $9.99 which is a great value for the money.

*Unfortunately, there is no torrent available for this particular book. But don’t worry, we at The Hidden Wiki will update this post with the torrent link if one comes available.


Applied Network Security Monitoring: Collection, Detection, and Analysis

good hacking books, hacking bookApplied Network Security Monitoring is a great practical guide into Network Security Monitoring (NSM) that covers the subject from the ground up.

It helps you to become an NSM analyst and teaches the key concepts of NSM accompanied by many practical tutorials and real-life examples. Applied Network Security Monitoring is one of the best books I’ve read on this subject so far.

The authors of the book, Chris Sanders and Jason Smith, are very experienced in the field on Network Security Monitoring and also know how to teach it to others in a way that is very attention holding and easy to understand if you’re new to the subject. They almost make NSM look easy! The author also offers online courses and training on his website that are definitely worth checking out (See training section on Chris Sanders website).

Finally, the book is divided into three primary sections (Collection, Detection, & Analysis) that take you through all stages of the NSM process. Each section contains practical examples and hands-on coverage of the tools needed which makes it very easy to learn the practical side of NSM alongside reading the book. The book provides thorough hands-on coverage of Snort, Suricata, Bro-IDS, SiLK, PRADS, and many others tools.

*Unfortunately, there is no torrent available for this particular book. But don’t worry, we at The Hidden Wiki will update this post with the torrent link if one comes available.