BooksThe Hacker PlaybookThe Hacker Playbook These are my notes from The Hacker Playbook by Peter Kim Scanning the network External Passive Discovery External/Internal Active Discovery Web Application Scanning Exploiting scanner findings Exploiting manual web application findings