[Booklist] Books for Learning (and Leveling Up) Penetration Testing
If you’re building a serious penetration testing learning path, the right books can compress years of trial-and-error into months. Below is a curated, field-tested list—from absolute beginner to advanced red-team ops—focused on practical skills, modern tooling, and timeless fundamentals.
How to use this list
- Pick one core track (Web, Network/Infra, or Generalist), then add one scripting title and one advanced/depth title.
- Do the labs as you read. Reading without hands-on practice won’t stick.
- Refresh with references. Tool bibles (Nmap, Metasploit) are worth keeping on your desk.
Beginner → Solid Foundations
- Penetration Testing: A Hands-On Introduction to Hacking — Georgia Weidman (No Starch)
A classic starter that walks you through a VM lab, Kali basics, and end-to-end workflow (recon → exploit → post-ex). Still one of the most approachable on-ramps. (No Starch Press) - The Pentester BluePrint — Phillip Wylie & Kim Crawley (Wiley)
Not a “how to hack” manual—more a roadmap for breaking into the field: roles, study paths, certs, labs. Great orientation for newcomers. (Amazon)
Add one scripting title early:
- Black Hat Python, 2nd Ed. — Justin Seitz & Tim Arnold (No Starch)
Python 3 throughout; build offensive tools, sniffers, fuzzers, implants—everything a pentester automates weekly. (No Starch Press)
Web Application & Bug Bounty Track
- The Web Application Hacker’s Handbook, 2nd Ed. — Stuttard & Pinto (Wiley)
The web-hacker’s canon. Burp-driven methodology, deep coverage of auth, input handling, logic flaws. Older, but the reasoning still trains your eye for bugs. Pair with OWASP docs for modern tech. (Wiley) - Bug Bounty Bootcamp — Vickie Li (No Starch)
Hands-on web vulns and reporting for bounty programs; bridges theory to “I can actually find and ship a report.” (No Starch Press)
Nice to have: Real-World Bug Hunting (Peter Yaworski) for annotated case studies (not listed below to keep this tight).
Network / Infrastructure & Tooling
- Nmap Network Scanning — Gordon “Fyodor” Lyon (Official Nmap Guide)
From port-scan theory to NSE scripting; the official reference by Nmap’s author. A must-own desk reference. (Nmap) - Metasploit: The Penetration Tester’s Guide, 2nd Ed. — Kennedy et al. (No Starch, 2025)
Fully updated second edition: new modules, cloud assessment chapter, AD attack discussion—great for building a repeatable exploit workflow. (No Starch Press) - Mastering Kali Linux for Advanced Penetration Testing, 3rd Ed. — Vijay Kumar Velu & Robert Beggs (Packt)
Infrastructure-focused, practical labs, and up-the-stack workflows on Kali for real engagements. (Packt)
Windows & Active Directory (Enterprise Reality)
- Pentesting Active Directory and Windows-based Infrastructure (Packt)
Modern AD attack surface, hands-on lab setup, and detection/defense angles alongside offense—useful beyond “just pop BloodHound.” (Packt)
Advanced Tradecraft / Red Team
- Advanced Penetration Testing: Hacking the World’s Most Secure Networks — Wil Allsopp (Wiley)
Campaign-style thinking: chaining social engineering, custom malware, and bespoke exploits to simulate real adversaries. Bridges pentesting to red-team ops. (Wiley) - Hands-On Hacking — Matthew Hickey & Jennifer Arcuri (Wiley)
TTP-oriented walkthroughs to think like an adversary and practice end-to-end operations across common environments. (AbeBooks)
Specialized Depth (Pick 1)
- Attacking Network Protocols — James Forshaw (No Starch)
A researcher’s view of finding bugs in protocols: capture, reverse, fuzz, exploit. If you enjoy root-cause vulnerability research, this levels you up. (No Starch Press) - (Optional) The Hacker Playbook 3 — Peter Kim
Play-by-play campaigns and checklists. Opinionated and practical; treat it like scrimmage plans for lab practice. (Amazon)
Suggested 90-Day Reading Plan (do the labs!)
Weeks 1–4
- Weidman’s Penetration Testing (core)
- Parallel: Black Hat Python (automate one task per chapter)
Weeks 5–8 - Pick your track:
- Web: Wahh2e + Bug Bounty Bootcamp (hunt one vuln class/week)
- Infra: Nmap Network Scanning (NSE basics) + Metasploit 2e (operator workflow)
Weeks 9–12
- Enterprise: Pentesting Active Directory (build mini-lab)
- Advanced: Advanced Penetration Testing or Attacking Network Protocols (one deep-dive project)
A few notes before you dive
- Do no harm. Only test in isolated labs or with written authorization.
- Books age; methodology doesn’t. For older titles, apply the mindset to today’s stacks and pair with docs/changelogs.
- Ship artifacts. Keep a hacking journal, scripts repo, and a small report template—you’ll learn faster and build a portfolio.
Sources & Edition Notes
- No Starch Press: Black Hat Python 2e (Python 3), Penetration Testing; catalog includes new security titles. (No Starch Press)
- Wiley: Web Application Hacker’s Handbook 2e; Advanced Penetration Testing. (Wiley)
- Nmap official book & docs: Nmap Network Scanning (official guide). (Nmap)
- Metasploit 2e (2025 update): publisher listings and previews. (No Starch Press)
- Packt: Mastering Kali Linux 3e; Pentesting Active Directory and Windows-based Infrastructure. (Packt)
- Web/bug bounty pick: Bug Bounty Bootcamp (No Starch). (No Starch Press)
- Specialized research: Attacking Network Protocols (Forshaw). (No Starch Press)
- Campaign playbook: The Hacker Playbook 3 (edition info). (Amazon)