Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Cybersecurity Attacks – Red Team Strategies

You're reading from   Cybersecurity Attacks – Red Team Strategies A practical guide to building a penetration testing program having homefield advantage

Arrow left icon
Product type Paperback
Published in Mar 2020
Publisher Packt
ISBN-13 9781838828868
Length 524 pages
Edition 1st Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Johann Rehberger Johann Rehberger
Author Profile Icon Johann Rehberger
Johann Rehberger
Arrow right icon
View More author details
Toc

Table of Contents (17) Chapters Close

Preface 1. Section 1: Embracing the Red
2. Chapter 1: Establishing an Offensive Security Program FREE CHAPTER 3. Chapter 2: Managing an Offensive Security Team 4. Chapter 3: Measuring an Offensive Security Program 5. Chapter 4: Progressive Red Teaming Operations 6. Section 2: Tactics and Techniques
7. Chapter 5: Situational Awareness – Mapping Out the Homefield Using Graph Databases 8. Chapter 6: Building a Comprehensive Knowledge Graph 9. Chapter 7: Hunting for Credentials 10. Chapter 8: Advanced Credential Hunting 11. Chapter 9: Powerful Automation 12. Chapter 10: Protecting the Pen Tester 13. Chapter 11: Traps, Deceptions, and Honeypots 14. Chapter 12: Blue Team Tactics for the Red Team 15. Assessments 16. Another Book You May Enjoy

To get the most out of this book 

The first part of the book does not require software or tools. What is needed is an open mind to learn about the importance of penetration testing and red teaming, and why and how to establish and grow an offensive security program within your organization. The examples to do with creating attack team dashboards and performing Monte Carlo simulations were created using Microsoft Office.

The second part will dive into a wider set of programs, tools, scripts, and code for Windows, Linux, and macOS. To follow along with every example in the book, all three major desktop operating systems are required. Some examples focus on one platform, but the reader will be able to get the same results (although with possibly slightly different workflows and steps) using any other operating system that supports the software. Some tools and software are very specific and not available on all platforms.

The second part of the book is not for beginners, as tools/scripts might need debugging and research for you to take full advantage of them and ensure that they work for your scenarios. Always do your own research before using something during a red-team operation or in a production setting.

The following table shows the majority of the tools and software that we will cover, discuss, or leverage throughout the book:

If you are using the digital version of this book, we advise you to type the code yourself or access the code via the GitHub repository (link available in the next section). Doing so will help you avoid any potential errors related to copy/pasting of code.

Regarding the versions of the software, the current version as of publication will suffice to follow along, and as stated the technical part of this book will require knowledge in troubleshooting and debugging skills.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime