Cargando…

Professional Red teaming : conducting successful cybersecurity engagements /

Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scri...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Oakley, Jacob G. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Berkeley, CA] : Apress, 2019.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1089683288
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 190311s2019 cau o 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d GW5XE  |d N$T  |d EBLCP  |d YDX  |d UPM  |d UKMGB  |d OCLCF  |d VT2  |d UMI  |d LQU  |d OCLCQ  |d COO  |d LEATE  |d UKAHL  |d OCLCQ  |d BRF  |d DCT  |d OCLCQ  |d OCLCO  |d COM  |d OCLCQ  |d OCLCO 
015 |a GBB952851  |2 bnb 
016 7 |a 019299084  |2 Uk 
019 |a 1089857278  |a 1090037196  |a 1091325334  |a 1103281006  |a 1104212015  |a 1105196901  |a 1111058409  |a 1122812900  |a 1129338666  |a 1152979204  |a 1156351455  |a 1162737474  |a 1192349302  |a 1204098506  |a 1240524333 
020 |a 9781484243091  |q (electronic bk.) 
020 |a 1484243099  |q (electronic bk.) 
020 |a 9781484243107  |q (print) 
020 |a 1484243102 
020 |z 9781484243084  |q (print) 
020 |z 1484243080 
024 7 |a 10.1007/978-1-4842-4309-1  |2 doi 
024 8 |a 10.1007/978-1-4842-4 
029 1 |a AU@  |b 000065126524 
029 1 |a AU@  |b 000065198802 
029 1 |a AU@  |b 000067505134 
029 1 |a CHNEW  |b 001084539 
029 1 |a CHSLU  |b 001359324 
029 1 |a CHVBK  |b 566427133 
029 1 |a CHVBK  |b 592047504 
029 1 |a UKMGB  |b 019299084 
035 |a (OCoLC)1089683288  |z (OCoLC)1089857278  |z (OCoLC)1090037196  |z (OCoLC)1091325334  |z (OCoLC)1103281006  |z (OCoLC)1104212015  |z (OCoLC)1105196901  |z (OCoLC)1111058409  |z (OCoLC)1122812900  |z (OCoLC)1129338666  |z (OCoLC)1152979204  |z (OCoLC)1156351455  |z (OCoLC)1162737474  |z (OCoLC)1192349302  |z (OCoLC)1204098506  |z (OCoLC)1240524333 
037 |a com.springer.onix.9781484243091  |b Springer Nature 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a UR  |2 bicssc 
072 7 |a UR  |2 thema 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Oakley, Jacob G.,  |e author. 
245 1 0 |a Professional Red teaming :  |b conducting successful cybersecurity engagements /  |c Jacob G. Oakley. 
264 1 |a [Berkeley, CA] :  |b Apress,  |c 2019. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
347 |b PDF 
500 |a Includes index. 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed March 13, 2019). 
505 0 |a Intro; Table of Contents; About the Author; About the Technical Reviewer; Acknowledgments; Introduction; Chapter 1: Red Teams in Cyberspace; Intentions; Advantages; Evaluating Preparedness; Evaluating Defenses; Evaluating Monitoring; Evaluating Responses; Disadvantages; Summary; Chapter 2: Why Human Hackers?; Innovation and Automation; Modeling Technology; Nonpivot Technology; Pivoting and Exploiting Technology; Automation Advantages and Disadvantages; Advantages; Disadvantages; Active; Passive; Example Scenarios; Scenario 1; Scenario 2; Scenario 3; Scenario 4; Threat Hunting; Summary 
505 8 |a Chapter 3: The State of Modern Offensive SecurityThe Challenge of Advanced Persistent Threats; More Capable; More Time; Infinite Scope; No Rules of Engagement; Environmental Challenges; Regulatory Standards; Limited Innovation; Misconceptions; Adversarial Customers; Technical Personnel; Managerial Personnel; User Personnel; Personnel Conclusion; Effective Red Team Staffing; Summary; Chapter 4: Shaping; Who; Customer Technical Personnel; Customer Operational Personnel; Provider Technical Personnel; Provider Operational Personnel; When; Preventing Incidents; Balancing Scope Attributes; What 
505 8 |a Motivation of the AssessmentPrior Testing; Existing Security; Scope Footprint; Inorganic Constraints; Summary; Chapter 5: Rules of Engagement; Activity Types; Physical; Social Engineering; External Network; Internal Network; Pivoting; Wireless Network; Category; Escalation of Force; Incident Handling; Tools; Certification Requirements; Personnel Information; Summary; Chapter 6: Executing; Staffing; The Professional Hacker; Best Practices; Check the ROE; Acknowledge Activity; Operational Tradecraft; Operational Notes; Enumeration and Exploitation; Postaccess Awareness; System Manipulation 
505 8 |a Leaving the TargetExample Operational Notes; Summary; Chapter 7: Reporting; Necessary Inclusions; Types of Findings; Exploited Vulnerabilities; Nonexploited Vulnerabilities; Technical Vulnerabilities; Nontechnical Vulnerabilities; Documenting Findings; Findings Summaries; Individual Findings; Briefing; The No-Results Assessment; Summary; Chapter 8: Purple Teaming; Challenges; People Problems; Customer Needs; Types of Purple Teaming; Reciprocal Awareness; Unwitting Host; Unwitting Attacker; Red-Handed Testing; Catch and Release; The Helpful Hacker; Summary; Chapter 9: Counter-APT Red Teaming 
505 8 |a CAPTR TeamingWorst-case Risk Analysis and Scoping; Critical Initialization Perspective; Reverse Pivot Chaining; Contrast; Zero Day; Insider Threats; Efficiency; Introduced Risk; Disadvantages; Summary; Chapter 10: Outcome-oriented Scoping; Worst-case Risk Assessment; The Right Stuff; Operational Personnel; Technical Personnel; Assessor Personnel; Example Scope; Centrality Analysis; Summary; Chapter 11: Initialization Perspectives; External Initialization Perspective; DMZ Initialization Perspective; Internal Initialization Perspective; Critical Initialization Perspective 
520 |a Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools. Professional Red Teaming introduces you to foundational offensive security concepts. The importance of assessments and ethical hacking is highlighted, and automated assessment technologies are addressed. The state of modern offensive security is discussed in terms of the unique challenges present in professional red teaming. Best practices and operational tradecraft are covered so you feel comfortable in the shaping and carrying out of red team engagements. Anecdotes from actual operations and example scenarios illustrate key concepts and cement a practical understanding of the red team process. You also are introduced to counter advanced persistent threat red teaming (CAPTR teaming). This is a reverse red teaming methodology aimed at specifically addressing the challenges faced from advanced persistent threats (APTs) by the organizations they target and the offensive security professionals trying to mitigate them. What You'll Learn: Understand the challenges faced by offensive security assessments Incorporate or conduct red teaming to better mitigate cyber threats Initiate a successful engagement Get introduced to counter-APT red teaming (CAPTR) Evaluate offensive security processes. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security  |2 fast 
776 0 8 |i Print version:  |a Oakley, Jacob G.  |t Professional Red teaming.  |d [Berkeley, CA] : Apress, 2019  |z 1484243080  |z 9781484243084  |w (OCoLC)1071867367 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484243091/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH36137296 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5726261 
938 |a EBSCOhost  |b EBSC  |n 2044893 
938 |a YBP Library Services  |b YANK  |n 16102446 
994 |a 92  |b IZTAP