Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time computer conflict
暫譯: 網路安全中的對抗技術:實時電腦衝突中的攻擊與防禦
Borges, Dan
- 出版商: Packt Publishing
- 出版日期: 2021-06-09
- 售價: $2,200
- 貴賓價: 9.5 折 $2,090
- 語言: 英文
- 頁數: 246
- 裝訂: Quality Paper - also called trade paper
- ISBN: 1801076200
- ISBN-13: 9781801076203
-
相關分類:
資訊安全
海外代購書籍(需單獨結帳)
相關主題
商品描述
Master cutting-edge techniques and countermeasures to protect your organization from live hackers. Learn how to harness cyber deception in your operations to gain an edge over the competition.
Key Features:
- Gain an advantage against live hackers in a competition or real computing environment
- Understand advanced red team and blue team techniques with code examples
- Learn to battle in short-term memory, whether remaining unseen (red teams) or monitoring an attacker's traffic (blue teams)
Book Description:
Little has been written about what to do when live hackers are on your system and running amok. Even experienced hackers tend to choke up when they realize the network defender has caught them and is zoning in on their implants in real time. This book will provide tips and tricks all along the kill chain of an attack, showing where hackers can have the upper hand in a live conflict and how defenders can outsmart them in this adversarial game of computer cat and mouse.
This book contains two subsections in each chapter, specifically focusing on the red and blue teams. It begins by introducing you to adversarial operations and principles of computer conflict where you will explore the core principles of deception, humanity, economy, and more about human-on-human conflicts. Additionally, you will understand everything from planning to setting up infrastructure and tooling that both sides should have in place.
Once you cover the basics, you will learn how to gain an advantage over opponents by disappearing from what they can detect. You will further understand how to blend in, uncover other actors' motivations and means, and learn to tamper with them to hinder their ability to detect your presence. Finally, you will grasp how to perform advanced research and conclude an operation.
By the end of this book, you will have achieved a solid understanding of cyberattacks from both an attacker's and a defender's perspective.
What You Will Learn:
- Understand how to implement process injection and how to detect it
- Turn the tables on the offense with active defense
- Disappear on the defender's system, by tampering with defensive sensors
- Upskill in using deception with your backdoors and countermeasures including honeypots
- Kick someone else from a computer you are on and gain the upper hand
Who this book is for:
Pentesters to red teamers, security operations center analysts to incident responders, attackers, defenders, general hackers, advanced computer users, and security engineers should gain a lot from this book. This book will also be beneficial to those getting into purple teaming or adversarial simulations, as it includes processes for gaining an advantage over the other team. Basic knowledge of Python programming, Go programming, Bash, PowerShell, and systems administration is desirable. Furthermore, knowledge of incident response and Linux is beneficial. Prior exposure to cybersecurity, penetration testing, and ethical hacking basics would be a plus.
商品描述(中文翻譯)
掌握尖端技術和對策,以保護您的組織免受現場駭客的攻擊。學習如何在您的操作中利用網絡欺騙,以獲得競爭優勢。
主要特點:
- 在競賽或實際計算環境中,對抗現場駭客獲得優勢
- 理解進階的紅隊和藍隊技術,並附有程式碼範例
- 學習在短期記憶中作戰,無論是保持隱身(紅隊)還是監控攻擊者的流量(藍隊)
書籍描述:
關於當現場駭客入侵您的系統並肆意妄為時該怎麼辦的文獻寥寥無幾。即使是經驗豐富的駭客,當他們意識到網絡防禦者已經發現他們並且正在實時鎖定他們的植入物時,也會感到窘迫。本書將提供攻擊整個殺戮鏈的提示和技巧,展示駭客在現場衝突中如何佔據上風,以及防禦者如何在這場對抗性的電腦貓鼠遊戲中智勝他們。
本書每章包含兩個子部分,專注於紅隊和藍隊。它首先介紹對抗性操作和計算機衝突的原則,您將探索欺騙、人性、經濟等人與人之間衝突的核心原則。此外,您將了解從規劃到設置基礎設施和工具,雙方應該具備的所有內容。
一旦掌握基礎知識,您將學會如何通過隱藏自己來獲得對手的優勢。您將進一步了解如何融入環境,揭示其他行為者的動機和手段,並學會干擾他們以阻礙他們檢測到您的存在。最後,您將掌握如何進行高級研究並結束一項操作。
到本書結束時,您將對網絡攻擊有一個堅實的理解,無論是從攻擊者還是防禦者的角度。
您將學到的內容:
- 理解如何實施過程注入以及如何檢測它
- 通過主動防禦反轉攻擊局勢
- 通過干擾防禦傳感器在防禦者的系統上隱身
- 提升使用後門和對策(包括蜜罐)的欺騙技能
- 從您正在使用的計算機上踢走其他人,獲得上風
本書適合誰:
從滲透測試者到紅隊成員,安全運營中心分析師到事件響應者,攻擊者、防禦者、一般駭客、高級計算機使用者和安全工程師都能從本書中獲益良多。本書對於進入紫隊或對抗性模擬的人士也將大有裨益,因為它包括獲得對其他隊伍優勢的過程。具備Python程式設計、Go程式設計、Bash、PowerShell和系統管理的基本知識是理想的。此外,了解事件響應和Linux的知識也會有幫助。先前接觸過網絡安全、滲透測試和道德駭客基礎知識將是加分項。