|
|
Books > Computing & IT > Social & legal aspects of computing > Computer viruses
Develop your red team skills by learning essential foundational
tactics, techniques, and procedures, and boost the overall security
posture of your organization by leveraging the homefield advantage
Key Features Build, manage, and measure an offensive red team
program Leverage the homefield advantage to stay ahead of your
adversaries Understand core adversarial tactics and techniques, and
protect pentesters and pentesting assets Book DescriptionIt's now
more important than ever for organizations to be ready to detect
and respond to security events and breaches. Preventive measures
alone are not enough for dealing with adversaries. A well-rounded
prevention, detection, and response program is required. This book
will guide you through the stages of building a red team program,
including strategies and homefield advantage opportunities to boost
security. The book starts by guiding you through establishing,
managing, and measuring a red team program, including effective
ways for sharing results and findings to raise awareness.
Gradually, you'll learn about progressive operations such as
cryptocurrency mining, focused privacy testing, targeting
telemetry, and even blue team tooling. Later, you'll discover
knowledge graphs and how to build them, then become well-versed
with basic to advanced techniques related to hunting for
credentials, and learn to automate Microsoft Office and browsers to
your advantage. Finally, you'll get to grips with protecting assets
using decoys, auditing, and alerting with examples for major
operating systems. By the end of this book, you'll have learned how
to build, manage, and measure a red team program effectively and be
well-versed with the fundamental operational techniques required to
enhance your existing skills. What you will learn Understand the
risks associated with security breaches Implement strategies for
building an effective penetration testing team Map out the
homefield using knowledge graphs Hunt credentials using indexing
and other practical techniques Gain blue team tooling insights to
enhance your red team skills Communicate results and influence
decision makers with appropriate data Who this book is forThis is
one of the few detailed cybersecurity books for penetration
testers, cybersecurity analysts, security leaders and strategists,
as well as red team members and chief information security officers
(CISOs) looking to secure their organizations from adversaries. The
program management part of this book will also be useful for
beginners in the cybersecurity domain. To get the most out of this
book, some penetration testing experience, and software engineering
and debugging skills are necessary.
Identify, exploit, and test web application security with ease Key
Features Get up to speed with Metasploit and discover how to use it
for pentesting Understand how to exploit and protect your web
environment effectively Learn how an exploit works and what causes
vulnerabilities Book DescriptionMetasploit has been a crucial
security tool for many years. However, there are only a few modules
that Metasploit has made available to the public for pentesting web
applications. In this book, you'll explore another aspect of the
framework - web applications - which is not commonly used. You'll
also discover how Metasploit, when used with its inbuilt GUI,
simplifies web application penetration testing. The book starts by
focusing on the Metasploit setup, along with covering the life
cycle of the penetration testing process. Then, you will explore
Metasploit terminology and the web GUI, which is available in the
Metasploit Community Edition. Next, the book will take you through
pentesting popular content management systems such as Drupal,
WordPress, and Joomla, which will also include studying the latest
CVEs and understanding the root cause of vulnerability in detail.
Later, you'll gain insights into the vulnerability assessment and
exploitation of technological platforms such as JBoss, Jenkins, and
Tomcat. Finally, you'll learn how to fuzz web applications to find
logical security vulnerabilities using third-party tools. By the
end of this book, you'll have a solid understanding of how to
exploit and validate vulnerabilities by working with various tools
and techniques. What you will learn Get up to speed with setting up
and installing the Metasploit framework Gain first-hand experience
of the Metasploit web interface Use Metasploit for web-application
reconnaissance Understand how to pentest various content management
systems Pentest platforms such as JBoss, Tomcat, and Jenkins Become
well-versed with fuzzing web applications Write and automate
penetration testing reports Who this book is forThis book is for
web security analysts, bug bounty hunters, security professionals,
or any stakeholder in the security sector who wants to delve into
web application security testing. Professionals who are not experts
with command line tools or Kali Linux and prefer Metasploit's
graphical user interface (GUI) will also find this book useful. No
experience with Metasploit is required, but basic knowledge of
Linux and web application pentesting will be helpful.
Insights into the true history of cyber warfare, and the
strategies, tactics, and cybersecurity tools that can be used to
better defend yourself and your organization against cyber threat.
Key Features Define and determine a cyber-defence strategy based on
current and past real-life examples Understand how future
technologies will impact cyber warfare campaigns and society
Future-ready yourself and your business against any cyber threat
Book DescriptionThe era of cyber warfare is now upon us. What we do
now and how we determine what we will do in the future is the
difference between whether our businesses live or die and whether
our digital self survives the digital battlefield. Cyber Warfare -
Truth, Tactics, and Strategies takes you on a journey through the
myriad of cyber attacks and threats that are present in a world
powered by AI, big data, autonomous vehicles, drones video, and
social media. Dr. Chase Cunningham uses his military background to
provide you with a unique perspective on cyber security and
warfare. Moving away from a reactive stance to one that is
forward-looking, he aims to prepare people and organizations to
better defend themselves in a world where there are no borders or
perimeters. He demonstrates how the cyber landscape is growing
infinitely more complex and is continuously evolving at the speed
of light. The book not only covers cyber warfare, but it also looks
at the political, cultural, and geographical influences that
pertain to these attack methods and helps you understand the
motivation and impacts that are likely in each scenario. Cyber
Warfare - Truth, Tactics, and Strategies is as real-life and
up-to-date as cyber can possibly be, with examples of actual
attacks and defense techniques, tools. and strategies presented for
you to learn how to think about defending your own systems and
data. What you will learn Hacking at scale - how machine learning
(ML) and artificial intelligence (AI) skew the battlefield
Defending a boundaryless enterprise Using video and audio as
weapons of influence Uncovering DeepFakes and their associated
attack vectors Using voice augmentation for exploitation Defending
when there is no perimeter Responding tactically to
counter-campaign-based attacks Who this book is forThis book is for
any engineer, leader, or professional with either a responsibility
for cyber security within their organizations, or an interest in
working in this ever-growing field.
Updated and revised edition of the bestselling guide to developing
defense strategies against the latest threats to cybersecurity Key
Features Covers the latest security threats and defense strategies
for 2020 Introduces techniques and skillsets required to conduct
threat hunting and deal with a system breach Provides new
information on Cloud Security Posture Management, Microsoft Azure
Threat Protection, Zero Trust Network strategies, Nation State
attacks, the use of Azure Sentinel as a cloud-based SIEM for
logging and investigation, and much more Book
DescriptionCybersecurity - Attack and Defense Strategies, Second
Edition is a completely revised new edition of the bestselling
book, covering the very latest security threats and defense
mechanisms including a detailed overview of Cloud Security Posture
Management (CSPM) and an assessment of the current threat
landscape, with additional focus on new IoT threats and
cryptomining. Cybersecurity starts with the basics that
organizations need to know to maintain a secure posture against
outside threat and design a robust cybersecurity program. It takes
you into the mindset of a Threat Actor to help you better
understand the motivation and the steps of performing an actual
attack - the Cybersecurity kill chain. You will gain hands-on
experience in implementing cybersecurity using new techniques in
reconnaissance and chasing a user's identity that will enable you
to discover how a system is compromised, and identify and then
exploit the vulnerabilities in your own system. This book also
focuses on defense strategies to enhance the security of a system.
You will also discover in-depth tools, including Azure Sentinel, to
ensure there are security controls in each network layer, and how
to carry out the recovery process of a compromised system. What you
will learn The importance of having a solid foundation for your
security posture Use cyber security kill chain to understand the
attack strategy Boost your organization's cyber resilience by
improving your security policies, hardening your network,
implementing active sensors, and leveraging threat intelligence
Utilize the latest defense tools, including Azure Sentinel and Zero
Trust Network strategy Identify different types of cyberattacks,
such as SQL injection, malware and social engineering threats such
as phishing emails Perform an incident investigation using Azure
Security Center and Azure Sentinel Get an in-depth understanding of
the disaster recovery process Understand how to consistently
monitor security and implement a vulnerability management strategy
for on-premises and hybrid cloud Learn how to perform log analysis
using the cloud to identify suspicious activities, including logs
from Amazon Web Services and Azure Who this book is forFor the IT
professional venturing into the IT security domain, IT pentesters,
security consultants, or those looking to perform ethical hacking.
Prior knowledge of penetration testing is beneficial.
Plug the gaps in your network's infrastructure with resilient
network security models Key Features Develop a cost-effective and
end-to-end vulnerability management program Explore best practices
for vulnerability scanning and risk assessment Understand and
implement network enumeration with Nessus and Network Mapper (Nmap)
Book DescriptionDigitization drives technology today, which is why
it's so important for organizations to design security mechanisms
for their network infrastructures. Analyzing vulnerabilities is one
of the best ways to secure your network infrastructure. This
Learning Path begins by introducing you to the various concepts of
network security assessment, workflows, and architectures. You will
learn to employ open source tools to perform both active and
passive network scanning and use these results to analyze and
design a threat model for network security. With a firm
understanding of the basics, you will then explore how to use
Nessus and Nmap to scan your network for vulnerabilities and open
ports and gain back door entry into a network. As you progress
through the chapters, you will gain insights into how to carry out
various key scanning tasks, including firewall detection, OS
detection, and access management to detect vulnerabilities in your
network. By the end of this Learning Path, you will be familiar
with the tools you need for network scanning and techniques for
vulnerability scanning and network protection. This Learning Path
includes content from the following Packt books: Network Scanning
Cookbook by Sairam Jetty Network Vulnerability Assessment by Sagar
Rahalkar What you will learn Explore various standards and
frameworks for vulnerability assessments and penetration testing
Gain insight into vulnerability scoring and reporting Discover the
importance of patching and security hardening Develop metrics to
measure the success of a vulnerability management program Perform
configuration audits for various platforms using Nessus Write
custom Nessus and Nmap scripts on your own Install and configure
Nmap and Nessus in your network infrastructure Perform host
discovery to identify network devices Who this book is forThis
Learning Path is designed for security analysts, threat analysts,
and security professionals responsible for developing a network
threat model for an organization. Professionals who want to be part
of a vulnerability management team and implement an end-to-end
robust vulnerability management program will also find this
Learning Path useful.
Build your organization's cyber defense system by effectively
implementing digital forensics and incident management techniques
Key Features Create a solid incident response framework and manage
cyber incidents effectively Perform malware analysis for effective
incident response Explore real-life scenarios that effectively use
threat intelligence and modeling techniques Book DescriptionAn
understanding of how digital forensics integrates with the overall
response to cybersecurity incidents is key to securing your
organization's infrastructure from attacks. This updated second
edition will help you perform cutting-edge digital forensic
activities and incident response. After focusing on the
fundamentals of incident response that are critical to any
information security team, you'll move on to exploring the incident
response framework. From understanding its importance to creating a
swift and effective response to security incidents, the book will
guide you with the help of useful examples. You'll later get up to
speed with digital forensic techniques, from acquiring evidence and
examining volatile memory through to hard drive examination and
network-based evidence. As you progress, you'll discover the role
that threat intelligence plays in the incident response process.
You'll also learn how to prepare an incident response report that
documents the findings of your analysis. Finally, in addition to
various incident response activities, the book will address malware
analysis, and demonstrate how you can proactively use your digital
forensic skills in threat hunting. By the end of this book, you'll
have learned how to efficiently investigate and report unwanted
security breaches and incidents in your organization. What you will
learn Create and deploy an incident response capability within your
own organization Perform proper evidence acquisition and handling
Analyze the evidence collected and determine the root cause of a
security incident Become well-versed with memory and log analysis
Integrate digital forensic techniques and procedures into the
overall incident response process Understand the different
techniques for threat hunting Write effective incident reports that
document the key findings of your analysis Who this book is forThis
book is for cybersecurity and information security professionals
who want to implement digital forensics and incident response in
their organization. You will also find the book helpful if you are
new to the concept of digital forensics and are looking to get
started with the fundamentals. A basic understanding of operating
systems and some knowledge of networking fundamentals are required
to get started with this book.
Explore open-source Linux tools and advanced binary analysis
techniques to analyze malware, identify vulnerabilities in code,
and mitigate information security risks Key Features Adopt a
methodological approach to binary ELF analysis on Linux Learn how
to disassemble binaries and understand disassembled code Discover
how and when to patch a malicious binary during analysis Book
DescriptionBinary analysis is the process of examining a binary
program to determine information security actions. It is a complex,
constantly evolving, and challenging topic that crosses over into
several domains of information technology and security. This binary
analysis book is designed to help you get started with the basics,
before gradually advancing to challenging topics. Using a
recipe-based approach, this book guides you through building a lab
of virtual machines and installing tools to analyze binaries
effectively. You'll begin by learning about the IA32 and ELF32 as
well as IA64 and ELF64 specifications. The book will then guide you
in developing a methodology and exploring a variety of tools for
Linux binary analysis. As you advance, you'll learn how to analyze
malicious 32-bit and 64-bit binaries and identify vulnerabilities.
You'll even examine obfuscation and anti-analysis techniques,
analyze polymorphed malicious binaries, and get a high-level
overview of dynamic taint analysis and binary instrumentation
concepts. By the end of the book, you'll have gained comprehensive
insights into binary analysis concepts and have developed the
foundational skills to confidently delve into the realm of binary
analysis. What you will learn Traverse the IA32, IA64, and ELF
specifications Explore Linux tools to disassemble ELF binaries
Identify vulnerabilities in 32-bit and 64-bit binaries Discover
actionable solutions to overcome the limitations in analyzing ELF
binaries Interpret the output of Linux tools to identify security
risks in binaries Understand how dynamic taint analysis works Who
this book is forThis book is for anyone looking to learn how to
dissect ELF binaries using open-source tools available in Linux. If
you're a Linux system administrator or information security
professional, you'll find this guide useful. Basic knowledge of
Linux, familiarity with virtualization technologies and the working
of network sockets, and experience in basic Python or Bash
scripting will assist you with understanding the concepts in this
book
Master the art of penetration testing with Metasploit Framework in
7 days About This Book * A fast-paced guide that will quickly
enhance your penetration testing skills in just 7 days * Carry out
penetration testing in complex and highly-secured environments. *
Learn techniques to Integrate Metasploit with industry's leading
tools Who This Book Is For If you are a penetration tester, ethical
hacker, or security consultant who quickly wants to master the
Metasploit framework and carry out advanced penetration testing in
highly secured environments then, this book is for you. What You
Will Learn * Get hands-on knowledge of Metasploit * Perform
penetration testing on services like Databases, VOIP and much more
* Understand how to Customize Metasploit modules and modify
existing exploits * Write simple yet powerful Metasploit automation
scripts * Explore steps involved in post-exploitation on Android
and mobile platforms. In Detail The book starts with a hands-on Day
1 chapter, covering the basics of the Metasploit framework and
preparing the readers for a self-completion exercise at the end of
every chapter. The Day 2 chapter dives deep into the use of
scanning and fingerprinting services with Metasploit while helping
the readers to modify existing modules according to their needs.
Following on from the previous chapter, Day 3 will focus on
exploiting various types of service and client-side exploitation
while Day 4 will focus on post-exploitation, and writing quick
scripts that helps with gathering the required information from the
exploited systems. The Day 5 chapter presents the reader with the
techniques involved in scanning and exploiting various services,
such as databases, mobile devices, and VOIP. The Day 6 chapter
prepares the reader to speed up and integrate Metasploit with
leading industry tools for penetration testing. Finally, Day 7
brings in sophisticated attack vectors and challenges based on the
user's preparation over the past six days and ends with a
Metasploit challenge to solve. Style and approach This book is all
about fast and intensive learning. That means we don't waste time
in helping readers get started. The new content is basically about
filling in with highly-effective examples to build new things, show
solving problems in newer and unseen ways, and solve real-world
examples.
|
|