|
|
Books > Computing & IT > Social & legal aspects of computing > Computer viruses
Build your organization's cyber defense system by effectively
applying digital forensics, incident management, and investigation
techniques to real-world cyber threats Key Features Create a solid
incident response framework and manage cyber incidents effectively
Learn to apply digital forensics tools and techniques to
investigate cyber threats Explore the real-world threat of
ransomware and apply proper incident response techniques for
investigation and recovery Book DescriptionAn understanding of how
digital forensics integrates with the overall response to
cybersecurity incidents is key to securing your organization's
infrastructure from attacks. This updated third edition will help
you perform cutting-edge digital forensic activities and incident
response with a new focus on responding to ransomware attacks.
After covering the fundamentals of incident response that are
critical to any information security team, you'll explore incident
response frameworks. From understanding their importance to
creating a swift and effective response to security incidents, the
book will guide you using examples. Later, you'll cover digital
forensic techniques, from acquiring evidence and examining volatile
memory through to hard drive examination and network-based
evidence. You'll be able to apply these techniques to the current
threat of ransomware. As you progress, you'll discover the role
that threat intelligence plays in the incident response process.
You'll also learn how to prepare an incident response report that
documents the findings of your analysis. Finally, in addition to
various incident response activities, the book will address malware
analysis and demonstrate how you can proactively use your digital
forensic skills in threat hunting. By the end of this book, you'll
be able to investigate and report unwanted security breaches and
incidents in your organization. What you will learn Create and
deploy an incident response capability within your own organization
Perform proper evidence acquisition and handling Analyze the
evidence collected and determine the root cause of a security
incident Integrate digital forensic techniques and procedures into
the overall incident response process Understand different
techniques for threat hunting Write incident reports that document
the key findings of your analysis Apply incident response practices
to ransomware attacks Leverage cyber threat intelligence to augment
digital forensics findings Who this book is forThis book is for
cybersecurity and information security professionals who want to
implement digital forensics and incident response in their
organizations. You'll also find the book helpful if you're new to
the concept of digital forensics and looking to get started with
the fundamentals. A basic understanding of operating systems and
some knowledge of networking fundamentals are required to get
started with this book.
Leverage cyber threat intelligence and the MITRE framework to
enhance your prevention mechanisms, detection capabilities, and
learn top adversarial simulation and emulation techniques Key
Features Apply real-world strategies to strengthen the capabilities
of your organization's security system Learn to not only defend
your system but also think from an attacker's perspective Ensure
the ultimate effectiveness of an organization's red and blue teams
with practical tips Book DescriptionWith small to large companies
focusing on hardening their security systems, the term "purple
team" has gained a lot of traction over the last couple of years.
Purple teams represent a group of individuals responsible for
securing an organization's environment using both red team and blue
team testing and integration - if you're ready to join or advance
their ranks, then this book is for you. Purple Team Strategies will
get you up and running with the exact strategies and techniques
used by purple teamers to implement and then maintain a robust
environment. You'll start with planning and prioritizing adversary
emulation, and explore concepts around building a purple team
infrastructure as well as simulating and defending against the most
trendy ATT&CK tactics. You'll also dive into performing
assessments and continuous testing with breach and attack
simulations. Once you've covered the fundamentals, you'll also
learn tips and tricks to improve the overall maturity of your
purple teaming capabilities along with measuring success with KPIs
and reporting. With the help of real-world use cases and examples,
by the end of this book, you'll be able to integrate the best of
both sides: red team tactics and blue team security measures. What
you will learn Learn and implement the generic purple teaming
process Use cloud environments for assessment and automation
Integrate cyber threat intelligence as a process Configure traps
inside the network to detect attackers Improve red and blue team
collaboration with existing and new tools Perform assessments of
your existing security controls Who this book is forIf you're a
cybersecurity analyst, SOC engineer, security leader or strategist,
or simply interested in learning about cyber attack and defense
strategies, then this book is for you. Purple team members and
chief information security officers (CISOs) looking at securing
their organizations from adversaries will also benefit from this
book. You'll need some basic knowledge of Windows and Linux
operating systems along with a fair understanding of networking
concepts before you can jump in, while ethical hacking and
penetration testing know-how will help you get the most out of this
book.
Identify, exploit, and test web application security with ease Key
Features Get up to speed with Metasploit and discover how to use it
for pentesting Understand how to exploit and protect your web
environment effectively Learn how an exploit works and what causes
vulnerabilities Book DescriptionMetasploit has been a crucial
security tool for many years. However, there are only a few modules
that Metasploit has made available to the public for pentesting web
applications. In this book, you'll explore another aspect of the
framework - web applications - which is not commonly used. You'll
also discover how Metasploit, when used with its inbuilt GUI,
simplifies web application penetration testing. The book starts by
focusing on the Metasploit setup, along with covering the life
cycle of the penetration testing process. Then, you will explore
Metasploit terminology and the web GUI, which is available in the
Metasploit Community Edition. Next, the book will take you through
pentesting popular content management systems such as Drupal,
WordPress, and Joomla, which will also include studying the latest
CVEs and understanding the root cause of vulnerability in detail.
Later, you'll gain insights into the vulnerability assessment and
exploitation of technological platforms such as JBoss, Jenkins, and
Tomcat. Finally, you'll learn how to fuzz web applications to find
logical security vulnerabilities using third-party tools. By the
end of this book, you'll have a solid understanding of how to
exploit and validate vulnerabilities by working with various tools
and techniques. What you will learn Get up to speed with setting up
and installing the Metasploit framework Gain first-hand experience
of the Metasploit web interface Use Metasploit for web-application
reconnaissance Understand how to pentest various content management
systems Pentest platforms such as JBoss, Tomcat, and Jenkins Become
well-versed with fuzzing web applications Write and automate
penetration testing reports Who this book is forThis book is for
web security analysts, bug bounty hunters, security professionals,
or any stakeholder in the security sector who wants to delve into
web application security testing. Professionals who are not experts
with command line tools or Kali Linux and prefer Metasploit's
graphical user interface (GUI) will also find this book useful. No
experience with Metasploit is required, but basic knowledge of
Linux and web application pentesting will be helpful.
Escalate your privileges on Windows and Linux platforms with
step-by-step instructions and deepen your theoretical foundations
Key Features Discover a range of techniques to escalate privileges
on Windows and Linux systems Understand the key differences between
Windows and Linux privilege escalation Explore unique exploitation
challenges in each chapter provided in the form of pre-built VMs
Book DescriptionPrivilege Escalation Techniques is a detailed guide
to privilege escalation techniques and tools for both Windows and
Linux systems. This is a one-of-a-kind resource that will deepen
your understanding of both platforms and provide detailed,
easy-to-follow instructions for your first foray into privilege
escalation. The book uses virtual environments that you can
download to test and run tools and techniques. After a refresher on
gaining access and surveying systems, each chapter will feature an
exploitation challenge in the form of pre-built virtual machines
(VMs). As you progress, you will learn how to enumerate and exploit
a target Linux or Windows system. You'll then get a demonstration
on how you can escalate your privileges to the highest level. By
the end of this book, you will have gained all the knowledge and
skills you need to be able to perform local kernel exploits,
escalate privileges through vulnerabilities in services, maintain
persistence, and enumerate information from the target such as
passwords and password hashes. What you will learn Understand the
privilege escalation process and set up a pentesting lab Gain an
initial foothold on the system Perform local enumeration on target
systems Exploit kernel vulnerabilities on Windows and Linux systems
Perform privilege escalation through password looting and finding
stored credentials Get to grips with performing impersonation
attacks Exploit Windows services such as the secondary logon handle
service to escalate Windows privileges Escalate Linux privileges by
exploiting scheduled tasks and SUID binaries Who this book is forIf
you're a pentester or a cybersecurity student interested in
learning how to perform various privilege escalation techniques on
Windows and Linux systems - including exploiting bugs and design
flaws - then this book is for you. You'll need a solid grasp on how
Windows and Linux systems work along with fundamental cybersecurity
knowledge before you get started.
Learn to identify security incidents and build a series of best
practices to stop cyber attacks before they create serious
consequences Key Features Discover Incident Response (IR), from its
evolution to implementation Understand cybersecurity essentials and
IR best practices through real-world phishing incident scenarios
Explore the current challenges in IR through the perspectives of
leading experts Book DescriptionCybercriminals are always in search
of new methods to infiltrate systems. Quickly responding to an
incident will help organizations minimize losses, decrease
vulnerabilities, and rebuild services and processes. In the wake of
the COVID-19 pandemic, with most organizations gravitating towards
remote working and cloud computing, this book uses frameworks such
as MITRE ATT&CK (R) and the SANS IR model to assess security
risks. The book begins by introducing you to the cybersecurity
landscape and explaining why IR matters. You will understand the
evolution of IR, current challenges, key metrics, and the
composition of an IR team, along with an array of methods and tools
used in an effective IR process. You will then learn how to apply
these strategies, with discussions on incident alerting, handling,
investigation, recovery, and reporting. Further, you will cover
governing IR on multiple platforms and sharing cyber threat
intelligence and the procedures involved in IR in the cloud.
Finally, the book concludes with an "Ask the Experts" chapter
wherein industry experts have provided their perspective on diverse
topics in the IR sphere. By the end of this book, you should become
proficient at building and applying IR strategies pre-emptively and
confidently. What you will learn Understand IR and its significance
Organize an IR team Explore best practices for managing attack
situations with your IR team Form, organize, and operate a product
security team to deal with product vulnerabilities and assess their
severity Organize all the entities involved in product security
response Respond to security vulnerabilities using tools developed
by Keepnet Labs and Binalyze Adapt all the above learnings for the
cloud Who this book is forThis book is aimed at first-time incident
responders, cybersecurity enthusiasts who want to get into IR, and
anyone who is responsible for maintaining business security. It
will also interest CIOs, CISOs, and members of IR, SOC, and CSIRT
teams. However, IR is not just about information technology or
security teams, and anyone with a legal, HR, media, or other active
business role would benefit from this book. The book assumes you
have some admin experience. No prior DFIR experience is required.
Some infosec knowledge will be a plus but isn't mandatory.
|
|