Pentesting Active Directory and Windows-based Infrastructure: A comprehensive practical guide to penetration testing Microsoft infrastructure
暫譯: 滲透測試 Active Directory 與 Windows 基礎架構:全面實用的 Microsoft 基礎架構滲透測試指南

Isakov, Denis

  • 出版商: Packt Publishing
  • 出版日期: 2023-11-17
  • 售價: $1,880
  • 貴賓價: 9.5$1,786
  • 語言: 英文
  • 頁數: 360
  • 裝訂: Quality Paper - also called trade paper
  • ISBN: 1804611360
  • ISBN-13: 9781804611364
  • 相關分類: Penetration-test
  • 海外代購書籍(需單獨結帳)

商品描述

Enhance your skill set to pentest against real-world Microsoft infrastructure with hands-on exercises and by following attack/detect guidelines with OpSec considerations

Key Features
  • Find out how to attack real-life Microsoft infrastructure
  • Discover how to detect adversary activities and remediate your environment
  • Apply the knowledge you've gained by working on hands-on exercises
  • Purchase of the print or Kindle book includes a free PDF eBook
Book Description

This book teaches you the tactics and techniques used to attack a Windows-based environment, along with showing you how to detect malicious activities and remediate misconfigurations and vulnerabilities.

You'll begin by deploying your lab, where every technique can be replicated. The chapters help you master every step of the attack kill chain and put new knowledge into practice. You'll discover how to evade defense of common built-in security mechanisms, such as AMSI, AppLocker, and Sysmon; perform reconnaissance and discovery activities in the domain environment by using common protocols and tools; and harvest domain-wide credentials. You'll also learn how to move laterally by blending into the environment's traffic to stay under radar, escalate privileges inside the domain and across the forest, and achieve persistence at the domain level and on the domain controller. Every chapter discusses OpSec considerations for each technique, and you'll apply this kill chain to perform the security assessment of other Microsoft products and services, such as Exchange, SQL Server, and SCCM.

By the end of this book, you'll be able to perform a full-fledged security assessment of the Microsoft environment, detect malicious activity in your network, and guide IT engineers on remediation steps to improve the security posture of the company.

What you will learn
  • Understand and adopt the Microsoft infrastructure kill chain methodology
  • Attack Windows services, such as Active Directory, Exchange, WSUS, SCCM, AD CS, and SQL Server
  • Disappear from the defender's eyesight by tampering with defensive capabilities
  • Upskill yourself in offensive OpSec to stay under the radar
  • Find out how to detect adversary activities in your Windows environment
  • Get to grips with the steps needed to remediate misconfigurations
  • Prepare yourself for real-life scenarios by getting hands-on experience with exercises
Who this book is for

This book is for pentesters and red teamers, security and IT engineers, as well as blue teamers and incident responders interested in Windows infrastructure security. The book is packed with practical examples, tooling, and attack-defense guidelines to help you assess and improve the security of your real-life environments. To get the most out of this book, you should have basic knowledge of Windows services and Active Directory.

Table of Contents
  1. Getting the Lab Ready and Attacking Exchange Server
  2. Defense Evasion
  3. Domain Reconnaissance and Discovery
  4. Credential Access in Domain
  5. Lateral Movement in Domain and Across Forests
  6. Domain Privilege Escalation
  7. Persistence on Domain Level
  8. Abusing Active Directory Certificate Services
  9. Compromising Microsoft SQL Server
  10. Taking over WSUS and SCCM

商品描述(中文翻譯)

提升您的技能,以針對真實世界的 Microsoft 基礎設施進行滲透測試,透過實作練習和遵循攻擊/檢測指導方針,並考慮操作安全 (OpSec) 的因素主要特點


  • 了解如何攻擊真實的 Microsoft 基礎設施

  • 發現如何檢測對手的活動並修復您的環境

  • 透過實作練習應用您所學的知識

  • 購買印刷版或 Kindle 書籍可獲得免費 PDF 電子書

書籍描述

本書教您攻擊基於 Windows 的環境所使用的戰術和技術,並展示如何檢測惡意活動以及修復錯誤配置和漏洞。

您將從部署實驗室開始,所有技術都可以重複實現。各章節幫助您掌握攻擊殺傷鏈的每一步,並將新知識付諸實踐。您將發現如何避開常見內建安全機制的防禦,例如 AMSI、AppLocker 和 Sysmon;使用常見協議和工具在域環境中執行偵查和發現活動;以及收集域範圍的憑證。您還將學習如何通過融入環境流量來橫向移動,以保持低調,提升在域內及整個森林中的權限,並在域級別及域控制器上實現持久性。每一章都討論了每種技術的操作安全考量,您將應用這一殺傷鏈來執行其他 Microsoft 產品和服務的安全評估,例如 Exchange、SQL Server 和 SCCM。

在本書結束時,您將能夠對 Microsoft 環境進行全面的安全評估,檢測網絡中的惡意活動,並指導 IT 工程師採取修復步驟以改善公司的安全狀態。

您將學到什麼

  • 理解並採用 Microsoft 基礎設施的殺傷鏈方法論

  • 攻擊 Windows 服務,例如 Active Directory、Exchange、WSUS、SCCM、AD CS 和 SQL Server

  • 通過篡改防禦能力來消失於防禦者的視線之外

  • 提升您的攻擊性操作安全技能,以保持低調

  • 了解如何在您的 Windows 環境中檢測對手的活動

  • 掌握修復錯誤配置所需的步驟

  • 通過實作練習為真實場景做好準備

本書適合誰

本書適合滲透測試者和紅隊成員、安全和 IT 工程師,以及對 Windows 基礎設施安全感興趣的藍隊成員和事件響應者。本書充滿了實用範例、工具和攻擊防禦指導方針,幫助您評估和改善真實環境的安全性。為了充分利用本書,您應具備基本的 Windows 服務和 Active Directory 知識。

目錄

  1. 準備實驗室並攻擊 Exchange Server

  2. 防禦規避

  3. 域偵查和發現

  4. 域中的憑證訪問

  5. 域內及跨森林的橫向移動

  6. 域權限提升

  7. 域級別的持久性

  8. 濫用 Active Directory 憑證服務

  9. 攻陷 Microsoft SQL Server

  10. 接管 WSUS 和 SCCM