
Physical Red Team Operations
Physical Penetration Testing with the REDTEAMOPSEC Methodology
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
$0.99/mo for the first 3 months

Buy for $14.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Joe Smith
About this listen
A manual for the very first physical red team operation methodology, REDTEAMOPSEC. This audiobook teaches how to execute every stage of a physical red team operation from reconnaissance to team mobilization, to offensive strike, and exfiltration. Learn how to conduct a Physical Red Team Operation with precision, confidence, and value.
For the first time in the red teaming industry, a consistent, repeatable, and comprehensive step-by-step introduction to the REDTEAMOPSEC methodology - created and refined by expert red teamers Jeremiah Talamantes of RedTeam Security and RedTeam Security Training - the subject of the viral documentary titled, ”Hacking the Grid”.
This audiobook is perfect for Penetration Testers, Security Consultants, IT Security Professionals, and Hackers. Downloadable material is offered in easy-to-follow lessons that allow even beginners to acquire the knowledge very quickly. Whether the listener will be hired at some point to penetrate security or simply trying to harden his or her own defenses, this audiobook is essential.
©2019 Jeremiah Talamantes (P)2019 Jeremiah TalamantesListeners also enjoyed...
-
CompTIA Security+ All-in-One Exam Guide Exam SY0-601 (Sixth Edition)
- By: Wm. Arthur Conklin, Greg White
- Narrated by: Derek Shoales
- Length: 30 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Get complete coverage of all objectives included on the CompTIA Security+ exam SY0-601 from this comprehensive resource. Written by a team of leading information security experts, this authoritative guide fully addresses the skills required to perform essential security functions and to secure hardware, systems, and software. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations.
-
-
great study materials
- By Zak West on 12-03-23
By: Wm. Arthur Conklin, and others
-
Red Team
- How to Succeed by Thinking Like the Enemy
- By: Micah Zenko
- Narrated by: Christopher Lane
- Length: 11 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
Red teaming. It is a practice as old as the Devil's Advocate, the 11th-century Vatican official charged with discrediting candidates for sainthood. Today, red teams - comprised primarily of fearless skeptics and those assuming the role of saboteurs who seek to better understand the interests, intentions, and capabilities of institutions or potential competitors - are used widely in both the public and private sector.
-
-
Repetitive
- By Pax S Whitmore on 07-12-16
By: Micah Zenko
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
Red Teaming
- How Your Business Can Conquer the Competition by Challenging Everything
- By: Bryce G. Hoffman
- Narrated by: Bryce G. Hoffman
- Length: 8 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Red Teaming is a revolutionary new way to make critical and contrarian thinking part of the planning process of any organization, allowing companies to stress test their strategies, flush out hidden threats and missed opportunities, and avoid being sandbagged by competitors.
-
-
Helpful techniques for stress testing
- By Pintoo on 02-26-23
By: Bryce G. Hoffman
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- By Anonymous User on 10-19-22
By: Maxie Reynolds
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Liberal Bias Rife and Unchecked
- By Sam Kopp on 12-18-19
By: Joseph Menn
-
CompTIA Security+ All-in-One Exam Guide Exam SY0-601 (Sixth Edition)
- By: Wm. Arthur Conklin, Greg White
- Narrated by: Derek Shoales
- Length: 30 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Get complete coverage of all objectives included on the CompTIA Security+ exam SY0-601 from this comprehensive resource. Written by a team of leading information security experts, this authoritative guide fully addresses the skills required to perform essential security functions and to secure hardware, systems, and software. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations.
-
-
great study materials
- By Zak West on 12-03-23
By: Wm. Arthur Conklin, and others
-
Red Team
- How to Succeed by Thinking Like the Enemy
- By: Micah Zenko
- Narrated by: Christopher Lane
- Length: 11 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
Red teaming. It is a practice as old as the Devil's Advocate, the 11th-century Vatican official charged with discrediting candidates for sainthood. Today, red teams - comprised primarily of fearless skeptics and those assuming the role of saboteurs who seek to better understand the interests, intentions, and capabilities of institutions or potential competitors - are used widely in both the public and private sector.
-
-
Repetitive
- By Pax S Whitmore on 07-12-16
By: Micah Zenko
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
Red Teaming
- How Your Business Can Conquer the Competition by Challenging Everything
- By: Bryce G. Hoffman
- Narrated by: Bryce G. Hoffman
- Length: 8 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Red Teaming is a revolutionary new way to make critical and contrarian thinking part of the planning process of any organization, allowing companies to stress test their strategies, flush out hidden threats and missed opportunities, and avoid being sandbagged by competitors.
-
-
Helpful techniques for stress testing
- By Pintoo on 02-26-23
By: Bryce G. Hoffman
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- By Anonymous User on 10-19-22
By: Maxie Reynolds
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Liberal Bias Rife and Unchecked
- By Sam Kopp on 12-18-19
By: Joseph Menn
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- By: Glen D. Singh
- Narrated by: Alex Freeman
- Length: 13 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.
-
-
Lack of clarity
- By Anonymous on 01-30-25
By: Glen D. Singh
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- By RM on 04-10-19
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- By: Lance Henderson
- Narrated by: James C. Lewis
- Length: 12 hrs and 57 mins
- Unabridged
-
Overall
-
Performance
-
Story
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web or The Hidden Wiki? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all: encrypting your files, securing your PC, masking your Online footsteps with Tor, VPNs, Freenet, and bitcoins, and all while giving you peace of mind with total 100 percent anonymity.
-
-
Technical deficiencies
- By Byzantine Technologies LLC on 07-16-19
By: Lance Henderson
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- By: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
A story that stands the test of time
- By Todd on 08-11-20
By: Cliff Stoll
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- By: Andy Greenberg
- Narrated by: Ari Fliakos
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Could not put this down
- By Mike Reaves on 01-28-23
By: Andy Greenberg
-
100 Deadly Skills
- The SEAL Operative's Guide to Eluding Pursuers, Evading Capture, and Surviving Any Dangerous Situation
- By: Clint Emerson
- Narrated by: Pete Simonelli
- Length: 3 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
100 Deadly Skills contains proven self-defense skills, evasion tactics, and immobilizing maneuvers - modified from the world of black ops - to help you take action in numerous "worst case" scenarios from escaping a locked trunk to making an improvised Taser to tricking facial recognition software. With easy-to-understand instructions, Emerson outlines in detail many life-saving strategies and teaches you how to think and act like a member of the special forces.
-
-
Only a small fraction of the information is useful
- By Mike Kirby on 11-18-15
By: Clint Emerson
-
Team of Teams
- New Rules of Engagement for a Complex World
- By: General Stanley McChrystal, Tantum Collins, David Silverman, and others
- Narrated by: Paul Michael
- Length: 12 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
The retired four-star general and and best-selling author of My Share of the Task shares a powerful new leadership model. Former General Stanley McChrystal held a key position for much of the War on Terror, as head of the Joint Special Operations Command. In Iraq, he found that despite the vastly superior resources, manpower, and training of the US Military, Al Qaeda had an advantage because of its structure as a loose network of small, independent cells. To defeat such an agile enemy, JSOC had to change its focus from efficiency to adaptability.
-
-
excellent book, very informative.
- By J.J. Gardona on 08-24-15
By: General Stanley McChrystal, and others
-
Introduction to Executive Protection
- By: Dale L. June, Elijah Shaw
- Narrated by: Dan Levy
- Length: 14 hrs and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
Since its original publication in 1998, Introduction to Executive Protection has been considered the bible of the executive security industry. Now in its fourth edition, this new volume, conceived and developed by Dale L. June, drawing from his experiences in the United States Secret Service, law enforcement, and the private sector, has been reworked and revised with new content, sections, and input with over 60 percent new material. this audiobook is a powerful learning tool, with the author now joined by Elijah Shaw, one of the foremost experts.
-
-
A must if your in this field
- By Ralph V. on 08-01-23
By: Dale L. June, and others
-
Human Hacking
- Win Friends, Influence People, and Leave Them Better Off for Having Met You
- By: Christopher Hadnagy, Seth Schulman
- Narrated by: Christopher Hadnagy
- Length: 8 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
A pioneer in the field of social engineering and a master hacker, Christopher Hadnagy specializes in understanding how malicious attackers exploit principles of human communication to access information and resources through manipulation and deceit. Now, he shows you how to use social engineering as a force for good - to help you regain your confidence and control. Hacking Humans provides tools that will help you establish rapport with strangers, use body language and verbal cues to your advantage, steer conversations and influence other’s decisions, and more.
-
-
Instead of this, buy “Social Engineering, Second Edition”.
- By Jessica on 11-30-21
By: Christopher Hadnagy, and others
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- By: Eric Conrad, Seth Misenar, Joshua Feldman
- Narrated by: Matthew E. Kelly
- Length: 10 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Eleventh Hour CISSP®: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. This new edition is aligned to cover all material in the most current version of the exam’s Common Body of Knowledge.
-
-
pretty good but need pdf file for charts
- By Amazon Customer on 08-24-21
By: Eric Conrad, and others
-
The Pentester BluePrint
- Starting a Career as an Ethical Hacker
- By: Phillip L. Wylie, Kim Crawley
- Narrated by: Matthew Josdal
- Length: 6 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.
-
-
Excellent book!
- By Jennifer Langford on 08-27-21
By: Phillip L. Wylie, and others
What listeners say about Physical Red Team Operations
Average customer ratingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Frank Schwarz
- 04-16-20
Good Red Team Information
it's a good book with good information. I think a chapter about why a corporation or company would need red teaming should be included.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Shawn M.
- 04-12-20
Good content, but
loved the content of this book, but hearing the narrator read out url after url makes me wanna pull my hair out. give an external guide with all the links and just have the narrator skip them.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
3 people found this helpful
-
Overall
-
Performance
-
Story
- Glenn Nunes
- 04-26-21
Interesting and nontechnical
I enjoyed this book a lot. It is understandable and interesting for persons without a background in this area.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- steve
- 05-02-21
I have listend to this this twice already
I really injoyed this book the author did a great job of not leaving me behind in the weeds even though I'm a noob to redteaming. if your into osint infosec ull love this book.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- SP
- 12-23-20
Read it
This book is an excellent how to for Red Teaming. Modern tactics, technology, and techniques.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Justin G.
- 08-05-21
It was a great listen and very informative!
this is the best book on audible concerning red team operations. amazing stuff! very detailed!
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!