Summary:
The book serves as a comprehensive guide to penetration testing, providing advanced techniques, methodologies, and practical tips for effectively breaking into systems as a security professional. It covers a range of topics from setting up a penetration testing lab to exploiting networks and applications, and includes real-world scenarios to help readers hone their hacking skills.
Key points:
1. Pre-engagement: This is the planning stage before a penetration test. It involves understanding client needs, defining the test scope, and setting engagement rules.
Books similar to "The Hacker Playbook 2":

The Hacker Playbook 3
Peter Kim

The Hacker Playbook
Peter Kim

The Pentester BluePrint
Phillip L. Wylie|Kim Crawley

Tribe of Hackers Red Team
Marcus J. Carey|Jennifer Jin

Hacking
Jon Erickson

Metasploit
David Kennedy|Jim O'Gorman|Devon Kearns|Mati Aharoni

The Art of Deception
Kevin D. Mitnick|William L. Simon

Tribe of Hackers Blue Team
Marcus J. Carey|Jennifer Jin

Violent Python
TJ O'Connor

Social Engineering
Christopher Hadnagy