Hands-on red team tactics :: a practical guide to mastering red team operations /
Red teaming is a process in which you use an attacker-like approach to secure your system, data, and network from getting breached. The main goal of the book is to equip the readers with the means to a smooth transition from a pen tester to a red teamer by focusing on the uncommon yet effective meth...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham :
Packt Publishing Ltd,
2018.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Red teaming is a process in which you use an attacker-like approach to secure your system, data, and network from getting breached. The main goal of the book is to equip the readers with the means to a smooth transition from a pen tester to a red teamer by focusing on the uncommon yet effective methods in a red teaming activity. |
Beschreibung: | Socat reverse shell over UDP. |
Beschreibung: | 1 online resource (469 pages) |
ISBN: | 9781788997003 178899700X |
Internformat
MARC
LEADER | 00000cam a2200000Ma 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1056875822 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 181013s2018 enk o 000 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d TEFOD |d MERUC |d TEFOD |d OCLCQ |d OCLCF |d UKMGB |d UKAHL |d OCLCQ |d N$T |d OCLCQ |d OCLCO |d NZAUC |d OCLCQ |d OCLCO |d OCLCL |d TMA |d OCLCQ |d HOPLA | ||
015 | |a GBB907316 |2 bnb | ||
015 | |a GBB917058 |2 bnb | ||
016 | 7 | |a 019078526 |2 Uk | |
020 | |a 9781788997003 |q (electronic bk.) | ||
020 | |a 178899700X |q (electronic bk.) | ||
035 | |a (OCoLC)1056875822 | ||
037 | |a 4616EF5E-BB35-4B18-9DEA-323D101DB3A8 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.9.A25 | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Sharma, Himanshu, |e author. |0 http://id.loc.gov/authorities/names/nb2009014366 | |
245 | 1 | 0 | |a Hands-on red team tactics : |b a practical guide to mastering red team operations / |c Himanshu Sharma, Harpreet Singh. |
246 | 3 | 0 | |a Red team tactics |
260 | |a Birmingham : |b Packt Publishing Ltd, |c 2018. | ||
300 | |a 1 online resource (469 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Red-Teaming and Pentesting; Pentesting 101; OWASP; Open Source Security Testing Methodology Manual (OSSTMM); Information Systems Security Assessment Framework (ISSAF); Penetration Testing Execution Standard (PTES); Pre-engagement interactions; Intelligence gathering; Threat modeling; Vulnerability analysis; Exploitation; Post-exploitation; Reporting; A different approach; Methodology; How is it different?; Summary; Questions; Further reading; Chapter 2: Pentesting 2018. | |
505 | 8 | |a Technical requirementsMSFvenom Payload Creator; Resource file; Koadic; Installation; Why use MSHTA as the dropper payload?; Terminology; Stager establishment; Payload execution; Running Implants; Pivoting; Summary; Questions; Further reading; Chapter 3: Foreplay -- Metasploit Basics; Technical requirements; Installing Metasploit; Running Metasploit; Auxiliaries; Exploits; Payloads; Encoders; Meterpreter; Armitage and team server; Metasploit with slack; Armitage and Cortana scripts; Summary; Questions; Further reading; Chapter 4: Getting Started with Cobalt Strike; Technical requirements. | |
505 | 8 | |a Planning a red-team exerciseCyber kill chain (CKC); Reconnaissance; Weaponization; Delivery; Exploitation; Installation; Command and Control Server; Actions; Objective and goal; Rules of Engagement (RoE); Scenario/strategy; Deliverables; Introduction to Cobalt Strike; What is a team server?; Cobalt Strike setup; Cobalt Strike interface; Toolbar; Connecting to another team server; Disconnecting from the team server; Configure listeners; Session graphs; Session table; Targets list; Credentials; Downloaded files; Keystrokes; Screenshots; Payload generation -- stageless Windows executable. | |
505 | 8 | |a Payload generation -- Java signed appletPayload generation -- MS Office macros; Scripted web delivery; File hosting; Managing the web server; Server switchbar; Customizing the team server; Summary; Questions; Further reading; Chapter 5: ./ReverseShell; Technical requirement; Introduction to reverse connections; Unencrypted reverse connections using netcat; Encrypted reverse connections using OpenSSL; Introduction to reverse shell connections; Unencrypted reverse shell using netcat; Encrypted reverse shell for *nix with OpenSSL packages installed; Encrypted reverse shell using ncat. | |
505 | 8 | |a Encrypted reverse shell using socatEncrypted reverse shell using cryptcat; Reverse shell using powercat; reverse_tcp; reverse_tcp_rc4; reverse_https; reverse_https with a custom SSL certificate; Meterpreter over ngrok; Reverse shell cheat sheet; Bash reverse shell; Zsh reverse shell; TCLsh/wish reverse shell; Ksh reverse shell; Netcat reverse shell; Telnet reverse shell; (G)awk reverse shell; R reverse shell; Python reverse shell; Perl reverse shell; Ruby reverse shell; Php reverse shell; Lua reverse shell; Nodejs reverse shell; Powershell reverse shell; Socat reverse shell over TCP. | |
500 | |a Socat reverse shell over UDP. | ||
520 | |a Red teaming is a process in which you use an attacker-like approach to secure your system, data, and network from getting breached. The main goal of the book is to equip the readers with the means to a smooth transition from a pen tester to a red teamer by focusing on the uncommon yet effective methods in a red teaming activity. | ||
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a Computer networking & communications. |2 bicssc | |
650 | 7 | |a Network security. |2 bicssc | |
650 | 7 | |a Computer security. |2 bicssc | |
650 | 7 | |a Computers |x Networking |x General. |2 bisacsh | |
650 | 7 | |a Computers |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a Computers |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
700 | 1 | |a Singh, Harpreet, |e author. | |
758 | |i has work: |a Hands-on red team tactics (Text) |1 https://id.oclc.org/worldcat/entity/E39PCH9jt6fQ6Hkprwh6hyrpKb |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Sharma, Himanshu. |t Hands-On Red Team Tactics : A Practical Guide to Mastering Red Team Operations. |d Birmingham : Packt Publishing Ltd, ©2018 |z 9781788995238 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1905964 |3 Volltext |
938 | |a hoopla Digital |b HOPL |n MWT13605260 | ||
938 | |a Askews and Holts Library Services |b ASKH |n BDZ0037800004 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL5532261 | ||
938 | |a EBSCOhost |b EBSC |n 1905964 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1056875822 |
---|---|
_version_ | 1816882474152624128 |
adam_text | |
any_adam_object | |
author | Sharma, Himanshu Singh, Harpreet |
author_GND | http://id.loc.gov/authorities/names/nb2009014366 |
author_facet | Sharma, Himanshu Singh, Harpreet |
author_role | aut aut |
author_sort | Sharma, Himanshu |
author_variant | h s hs h s hs |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Red-Teaming and Pentesting; Pentesting 101; OWASP; Open Source Security Testing Methodology Manual (OSSTMM); Information Systems Security Assessment Framework (ISSAF); Penetration Testing Execution Standard (PTES); Pre-engagement interactions; Intelligence gathering; Threat modeling; Vulnerability analysis; Exploitation; Post-exploitation; Reporting; A different approach; Methodology; How is it different?; Summary; Questions; Further reading; Chapter 2: Pentesting 2018. Technical requirementsMSFvenom Payload Creator; Resource file; Koadic; Installation; Why use MSHTA as the dropper payload?; Terminology; Stager establishment; Payload execution; Running Implants; Pivoting; Summary; Questions; Further reading; Chapter 3: Foreplay -- Metasploit Basics; Technical requirements; Installing Metasploit; Running Metasploit; Auxiliaries; Exploits; Payloads; Encoders; Meterpreter; Armitage and team server; Metasploit with slack; Armitage and Cortana scripts; Summary; Questions; Further reading; Chapter 4: Getting Started with Cobalt Strike; Technical requirements. Planning a red-team exerciseCyber kill chain (CKC); Reconnaissance; Weaponization; Delivery; Exploitation; Installation; Command and Control Server; Actions; Objective and goal; Rules of Engagement (RoE); Scenario/strategy; Deliverables; Introduction to Cobalt Strike; What is a team server?; Cobalt Strike setup; Cobalt Strike interface; Toolbar; Connecting to another team server; Disconnecting from the team server; Configure listeners; Session graphs; Session table; Targets list; Credentials; Downloaded files; Keystrokes; Screenshots; Payload generation -- stageless Windows executable. Payload generation -- Java signed appletPayload generation -- MS Office macros; Scripted web delivery; File hosting; Managing the web server; Server switchbar; Customizing the team server; Summary; Questions; Further reading; Chapter 5: ./ReverseShell; Technical requirement; Introduction to reverse connections; Unencrypted reverse connections using netcat; Encrypted reverse connections using OpenSSL; Introduction to reverse shell connections; Unencrypted reverse shell using netcat; Encrypted reverse shell for *nix with OpenSSL packages installed; Encrypted reverse shell using ncat. Encrypted reverse shell using socatEncrypted reverse shell using cryptcat; Reverse shell using powercat; reverse_tcp; reverse_tcp_rc4; reverse_https; reverse_https with a custom SSL certificate; Meterpreter over ngrok; Reverse shell cheat sheet; Bash reverse shell; Zsh reverse shell; TCLsh/wish reverse shell; Ksh reverse shell; Netcat reverse shell; Telnet reverse shell; (G)awk reverse shell; R reverse shell; Python reverse shell; Perl reverse shell; Ruby reverse shell; Php reverse shell; Lua reverse shell; Nodejs reverse shell; Powershell reverse shell; Socat reverse shell over TCP. |
ctrlnum | (OCoLC)1056875822 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06168cam a2200673Ma 4500</leader><controlfield tag="001">ZDB-4-EBA-on1056875822</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">181013s2018 enk o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">EBLCP</subfield><subfield code="d">TEFOD</subfield><subfield code="d">MERUC</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">UKMGB</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">NZAUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">TMA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">HOPLA</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB907316</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB917058</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">019078526</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781788997003</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">178899700X</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1056875822</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">4616EF5E-BB35-4B18-9DEA-323D101DB3A8</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sharma, Himanshu,</subfield><subfield code="e">author.</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb2009014366</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hands-on red team tactics :</subfield><subfield code="b">a practical guide to mastering red team operations /</subfield><subfield code="c">Himanshu Sharma, Harpreet Singh.</subfield></datafield><datafield tag="246" ind1="3" ind2="0"><subfield code="a">Red team tactics</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Birmingham :</subfield><subfield code="b">Packt Publishing Ltd,</subfield><subfield code="c">2018.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (469 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Red-Teaming and Pentesting; Pentesting 101; OWASP; Open Source Security Testing Methodology Manual (OSSTMM); Information Systems Security Assessment Framework (ISSAF); Penetration Testing Execution Standard (PTES); Pre-engagement interactions; Intelligence gathering; Threat modeling; Vulnerability analysis; Exploitation; Post-exploitation; Reporting; A different approach; Methodology; How is it different?; Summary; Questions; Further reading; Chapter 2: Pentesting 2018.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Technical requirementsMSFvenom Payload Creator; Resource file; Koadic; Installation; Why use MSHTA as the dropper payload?; Terminology; Stager establishment; Payload execution; Running Implants; Pivoting; Summary; Questions; Further reading; Chapter 3: Foreplay -- Metasploit Basics; Technical requirements; Installing Metasploit; Running Metasploit; Auxiliaries; Exploits; Payloads; Encoders; Meterpreter; Armitage and team server; Metasploit with slack; Armitage and Cortana scripts; Summary; Questions; Further reading; Chapter 4: Getting Started with Cobalt Strike; Technical requirements.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Planning a red-team exerciseCyber kill chain (CKC); Reconnaissance; Weaponization; Delivery; Exploitation; Installation; Command and Control Server; Actions; Objective and goal; Rules of Engagement (RoE); Scenario/strategy; Deliverables; Introduction to Cobalt Strike; What is a team server?; Cobalt Strike setup; Cobalt Strike interface; Toolbar; Connecting to another team server; Disconnecting from the team server; Configure listeners; Session graphs; Session table; Targets list; Credentials; Downloaded files; Keystrokes; Screenshots; Payload generation -- stageless Windows executable.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Payload generation -- Java signed appletPayload generation -- MS Office macros; Scripted web delivery; File hosting; Managing the web server; Server switchbar; Customizing the team server; Summary; Questions; Further reading; Chapter 5: ./ReverseShell; Technical requirement; Introduction to reverse connections; Unencrypted reverse connections using netcat; Encrypted reverse connections using OpenSSL; Introduction to reverse shell connections; Unencrypted reverse shell using netcat; Encrypted reverse shell for *nix with OpenSSL packages installed; Encrypted reverse shell using ncat.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Encrypted reverse shell using socatEncrypted reverse shell using cryptcat; Reverse shell using powercat; reverse_tcp; reverse_tcp_rc4; reverse_https; reverse_https with a custom SSL certificate; Meterpreter over ngrok; Reverse shell cheat sheet; Bash reverse shell; Zsh reverse shell; TCLsh/wish reverse shell; Ksh reverse shell; Netcat reverse shell; Telnet reverse shell; (G)awk reverse shell; R reverse shell; Python reverse shell; Perl reverse shell; Ruby reverse shell; Php reverse shell; Lua reverse shell; Nodejs reverse shell; Powershell reverse shell; Socat reverse shell over TCP.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Socat reverse shell over UDP.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Red teaming is a process in which you use an attacker-like approach to secure your system, data, and network from getting breached. The main goal of the book is to equip the readers with the means to a smooth transition from a pen tester to a red teamer by focusing on the uncommon yet effective methods in a red teaming activity.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh90001862</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networking & communications.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Network security.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Networking</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Singh, Harpreet,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Hands-on red team tactics (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCH9jt6fQ6Hkprwh6hyrpKb</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Sharma, Himanshu.</subfield><subfield code="t">Hands-On Red Team Tactics : A Practical Guide to Mastering Red Team Operations.</subfield><subfield code="d">Birmingham : Packt Publishing Ltd, ©2018</subfield><subfield code="z">9781788995238</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1905964</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">hoopla Digital</subfield><subfield code="b">HOPL</subfield><subfield code="n">MWT13605260</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">BDZ0037800004</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL5532261</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1905964</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1056875822 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:29:11Z |
institution | BVB |
isbn | 9781788997003 178899700X |
language | English |
oclc_num | 1056875822 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (469 pages) |
psigel | ZDB-4-EBA |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Packt Publishing Ltd, |
record_format | marc |
spelling | Sharma, Himanshu, author. http://id.loc.gov/authorities/names/nb2009014366 Hands-on red team tactics : a practical guide to mastering red team operations / Himanshu Sharma, Harpreet Singh. Red team tactics Birmingham : Packt Publishing Ltd, 2018. 1 online resource (469 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Print version record. Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Red-Teaming and Pentesting; Pentesting 101; OWASP; Open Source Security Testing Methodology Manual (OSSTMM); Information Systems Security Assessment Framework (ISSAF); Penetration Testing Execution Standard (PTES); Pre-engagement interactions; Intelligence gathering; Threat modeling; Vulnerability analysis; Exploitation; Post-exploitation; Reporting; A different approach; Methodology; How is it different?; Summary; Questions; Further reading; Chapter 2: Pentesting 2018. Technical requirementsMSFvenom Payload Creator; Resource file; Koadic; Installation; Why use MSHTA as the dropper payload?; Terminology; Stager establishment; Payload execution; Running Implants; Pivoting; Summary; Questions; Further reading; Chapter 3: Foreplay -- Metasploit Basics; Technical requirements; Installing Metasploit; Running Metasploit; Auxiliaries; Exploits; Payloads; Encoders; Meterpreter; Armitage and team server; Metasploit with slack; Armitage and Cortana scripts; Summary; Questions; Further reading; Chapter 4: Getting Started with Cobalt Strike; Technical requirements. Planning a red-team exerciseCyber kill chain (CKC); Reconnaissance; Weaponization; Delivery; Exploitation; Installation; Command and Control Server; Actions; Objective and goal; Rules of Engagement (RoE); Scenario/strategy; Deliverables; Introduction to Cobalt Strike; What is a team server?; Cobalt Strike setup; Cobalt Strike interface; Toolbar; Connecting to another team server; Disconnecting from the team server; Configure listeners; Session graphs; Session table; Targets list; Credentials; Downloaded files; Keystrokes; Screenshots; Payload generation -- stageless Windows executable. Payload generation -- Java signed appletPayload generation -- MS Office macros; Scripted web delivery; File hosting; Managing the web server; Server switchbar; Customizing the team server; Summary; Questions; Further reading; Chapter 5: ./ReverseShell; Technical requirement; Introduction to reverse connections; Unencrypted reverse connections using netcat; Encrypted reverse connections using OpenSSL; Introduction to reverse shell connections; Unencrypted reverse shell using netcat; Encrypted reverse shell for *nix with OpenSSL packages installed; Encrypted reverse shell using ncat. Encrypted reverse shell using socatEncrypted reverse shell using cryptcat; Reverse shell using powercat; reverse_tcp; reverse_tcp_rc4; reverse_https; reverse_https with a custom SSL certificate; Meterpreter over ngrok; Reverse shell cheat sheet; Bash reverse shell; Zsh reverse shell; TCLsh/wish reverse shell; Ksh reverse shell; Netcat reverse shell; Telnet reverse shell; (G)awk reverse shell; R reverse shell; Python reverse shell; Perl reverse shell; Ruby reverse shell; Php reverse shell; Lua reverse shell; Nodejs reverse shell; Powershell reverse shell; Socat reverse shell over TCP. Socat reverse shell over UDP. Red teaming is a process in which you use an attacker-like approach to secure your system, data, and network from getting breached. The main goal of the book is to equip the readers with the means to a smooth transition from a pen tester to a red teamer by focusing on the uncommon yet effective methods in a red teaming activity. Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. Computer networking & communications. bicssc Network security. bicssc Computer security. bicssc Computers Networking General. bisacsh Computers Networking Security. bisacsh Computers Security General. bisacsh Computer networks Security measures fast Computer security fast Singh, Harpreet, author. has work: Hands-on red team tactics (Text) https://id.oclc.org/worldcat/entity/E39PCH9jt6fQ6Hkprwh6hyrpKb https://id.oclc.org/worldcat/ontology/hasWork Print version: Sharma, Himanshu. Hands-On Red Team Tactics : A Practical Guide to Mastering Red Team Operations. Birmingham : Packt Publishing Ltd, ©2018 9781788995238 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1905964 Volltext |
spellingShingle | Sharma, Himanshu Singh, Harpreet Hands-on red team tactics : a practical guide to mastering red team operations / Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Red-Teaming and Pentesting; Pentesting 101; OWASP; Open Source Security Testing Methodology Manual (OSSTMM); Information Systems Security Assessment Framework (ISSAF); Penetration Testing Execution Standard (PTES); Pre-engagement interactions; Intelligence gathering; Threat modeling; Vulnerability analysis; Exploitation; Post-exploitation; Reporting; A different approach; Methodology; How is it different?; Summary; Questions; Further reading; Chapter 2: Pentesting 2018. Technical requirementsMSFvenom Payload Creator; Resource file; Koadic; Installation; Why use MSHTA as the dropper payload?; Terminology; Stager establishment; Payload execution; Running Implants; Pivoting; Summary; Questions; Further reading; Chapter 3: Foreplay -- Metasploit Basics; Technical requirements; Installing Metasploit; Running Metasploit; Auxiliaries; Exploits; Payloads; Encoders; Meterpreter; Armitage and team server; Metasploit with slack; Armitage and Cortana scripts; Summary; Questions; Further reading; Chapter 4: Getting Started with Cobalt Strike; Technical requirements. Planning a red-team exerciseCyber kill chain (CKC); Reconnaissance; Weaponization; Delivery; Exploitation; Installation; Command and Control Server; Actions; Objective and goal; Rules of Engagement (RoE); Scenario/strategy; Deliverables; Introduction to Cobalt Strike; What is a team server?; Cobalt Strike setup; Cobalt Strike interface; Toolbar; Connecting to another team server; Disconnecting from the team server; Configure listeners; Session graphs; Session table; Targets list; Credentials; Downloaded files; Keystrokes; Screenshots; Payload generation -- stageless Windows executable. Payload generation -- Java signed appletPayload generation -- MS Office macros; Scripted web delivery; File hosting; Managing the web server; Server switchbar; Customizing the team server; Summary; Questions; Further reading; Chapter 5: ./ReverseShell; Technical requirement; Introduction to reverse connections; Unencrypted reverse connections using netcat; Encrypted reverse connections using OpenSSL; Introduction to reverse shell connections; Unencrypted reverse shell using netcat; Encrypted reverse shell for *nix with OpenSSL packages installed; Encrypted reverse shell using ncat. Encrypted reverse shell using socatEncrypted reverse shell using cryptcat; Reverse shell using powercat; reverse_tcp; reverse_tcp_rc4; reverse_https; reverse_https with a custom SSL certificate; Meterpreter over ngrok; Reverse shell cheat sheet; Bash reverse shell; Zsh reverse shell; TCLsh/wish reverse shell; Ksh reverse shell; Netcat reverse shell; Telnet reverse shell; (G)awk reverse shell; R reverse shell; Python reverse shell; Perl reverse shell; Ruby reverse shell; Php reverse shell; Lua reverse shell; Nodejs reverse shell; Powershell reverse shell; Socat reverse shell over TCP. Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. Computer networking & communications. bicssc Network security. bicssc Computer security. bicssc Computers Networking General. bisacsh Computers Networking Security. bisacsh Computers Security General. bisacsh Computer networks Security measures fast Computer security fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh90001862 http://id.loc.gov/authorities/subjects/sh94001277 |
title | Hands-on red team tactics : a practical guide to mastering red team operations / |
title_alt | Red team tactics |
title_auth | Hands-on red team tactics : a practical guide to mastering red team operations / |
title_exact_search | Hands-on red team tactics : a practical guide to mastering red team operations / |
title_full | Hands-on red team tactics : a practical guide to mastering red team operations / Himanshu Sharma, Harpreet Singh. |
title_fullStr | Hands-on red team tactics : a practical guide to mastering red team operations / Himanshu Sharma, Harpreet Singh. |
title_full_unstemmed | Hands-on red team tactics : a practical guide to mastering red team operations / Himanshu Sharma, Harpreet Singh. |
title_short | Hands-on red team tactics : |
title_sort | hands on red team tactics a practical guide to mastering red team operations |
title_sub | a practical guide to mastering red team operations / |
topic | Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. Computer networking & communications. bicssc Network security. bicssc Computer security. bicssc Computers Networking General. bisacsh Computers Networking Security. bisacsh Computers Security General. bisacsh Computer networks Security measures fast Computer security fast |
topic_facet | Computer security. Computer networks Security measures. Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. Computer networking & communications. Network security. Computers Networking General. Computers Networking Security. Computers Security General. Computer networks Security measures Computer security |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1905964 |
work_keys_str_mv | AT sharmahimanshu handsonredteamtacticsapracticalguidetomasteringredteamoperations AT singhharpreet handsonredteamtacticsapracticalguidetomasteringredteamoperations AT sharmahimanshu redteamtactics AT singhharpreet redteamtactics |