Book description
Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantage
Key Features
- Build, manage, and measure an offensive red team program
- Leverage the homefield advantage to stay ahead of your adversaries
- Understand core adversarial tactics and techniques, and protect pentesters and pentesting assets
Book Description
It's now more important than ever for organizations to be ready to detect and respond to security events and breaches. Preventive measures alone are not enough for dealing with adversaries. A well-rounded prevention, detection, and response program is required. This book will guide you through the stages of building a red team program, including strategies and homefield advantage opportunities to boost security.
The book starts by guiding you through establishing, managing, and measuring a red team program, including effective ways for sharing results and findings to raise awareness. Gradually, you'll learn about progressive operations such as cryptocurrency mining, focused privacy testing, targeting telemetry, and even blue team tooling. Later, you'll discover knowledge graphs and how to build them, then become well-versed with basic to advanced techniques related to hunting for credentials, and learn to automate Microsoft Office and browsers to your advantage. Finally, you'll get to grips with protecting assets using decoys, auditing, and alerting with examples for major operating systems.
By the end of this book, you'll have learned how to build, manage, and measure a red team program effectively and be well-versed with the fundamental operational techniques required to enhance your existing skills.
What you will learn
- Understand the risks associated with security breaches
- Implement strategies for building an effective penetration testing team
- Map out the homefield using knowledge graphs
- Hunt credentials using indexing and other practical techniques
- Gain blue team tooling insights to enhance your red team skills
- Communicate results and influence decision makers with appropriate data
Who this book is for
This is one of the few detailed cybersecurity books for penetration testers, cybersecurity analysts, security leaders and strategists, as well as red team members and chief information security officers (CISOs) looking to secure their organizations from adversaries. The program management part of this book will also be useful for beginners in the cybersecurity domain. To get the most out of this book, some penetration testing experience, and software engineering and debugging skills are necessary.
Table of contents
- Cybersecurity Attacks – Red Team Strategies
- Why subscribe?
- Contributors
- About the author
- About the reviewers
- Packt is searching for authors like you
- Preface
- Section 1: Embracing the Red
-
Chapter 1: Establishing an Offensive Security Program
- Defining the mission – the devil's advocate
- Getting leadership support
- Locating a red team in the organization chart
-
The road ahead for offensive security
- Building a new program from scratch
- Inheriting an existing program
- People – meeting the red team crew
- Penetration testers and why they are so awesome!
- Offensive security engineering as a professional discipline
- Strategic red teamers
- Program management
- Attracting and retaining talent
- Diversity and inclusion
- Morale and team identity
- The reputation of the team
- Providing different services to the organization
- Additional responsibilities of the offensive program
- Training and education of the offensive security team
- Policies – principles, rules, and standards
- Rules of engagement
-
Standard operating procedure
- Leveraging attack plans to track an operation
- Mission objective – what are we setting out to achieve or demonstrate?
- Stakeholders and their responsibilities
- Codenames
- Timelines and duration
- Understanding the risks of penetration testing and authorization
- Kick-off meeting
- Deliverables
- Notifying stakeholders
- Attack plan during execution – tracking progress during an operation
- Documenting activities
- Wrapping up an operation
- Overarching information sharing via dashboards
- Contacting the pen test team and requesting services
- Modeling the adversary
- Anatomy of a breach
- Modes of execution – surgical or carpet bombing
- Environment and office space
- Summary
- Questions
-
Chapter 2: Managing an Offensive Security Team
-
Understanding the rhythm of the business and planning Red Team operations
- Planning cycles
- Offsites
- Encouraging diverse ideas and avoiding groupthink
- Planning operations – focus on objectives
- Planning operations - focus on assets
- Planning operations - focus on vulnerabilities
- Planning operations – focus on attack tactics, techniques, and procedures
- Planning operations – focus on STRIDE
- Managing and assessing the team
- Management by walking around
- Managing your leadership team
- Managing yourself
- Handling logistics, meetings, and staying on track
- Growing as a team
- Leading and inspiring the team
- For the best results – let them loose!
-
Leveraging homefield advantage
- Finding a common goal between red, blue, and engineering teams
- Getting caught! How to build a bridge
- Learning from each other to improve
- Threat hunting
- Growing the purple team so that it's more effective
- Offensive techniques and defensive countermeasures
- Surrendering those attack machines!
- Active defense, honeypots, and decoys
- Protecting the pen tester
- Performing continuous end-to-end test validation of the incident response pipeline
- Combatting the normalization of deviance
- Retaining a healthy adversarial view between red and blue teams
- Disrupting the purple team
- Summary
- Questions
-
Understanding the rhythm of the business and planning Red Team operations
-
Chapter 3: Measuring an Offensive Security Program
- Understanding the illusion of control
-
The road to maturity
- Strategic red teaming across organizations
- The risks of operating in cloak-and-dagger mode
- Tracking findings and incidents
- Repeatability
- Automating red teaming activities to help defenders
- Protecting information – securing red team findings
- Measuring red team persistence over time
- Tackling the fog of war
- Threats – trees and graphs
- Defining metrics and KPIs
- Test Maturity Model integration (TMMi ®)and red teaming
- MITRE ATT&CK™ Matrix
- Remembering what red teaming is about
- Summary
- Questions
-
Chapter 4: Progressive Red Teaming Operations
- Exploring varieties of cyber operational engagements
- Cryptocurrency mining
- Red teaming for privacy
- Red teaming the red team
- Targeting the blue team
- Leveraging the blue team's endpoint protection as C2
- Social media and targeted advertising
- Targeting telemetry collection to manipulate feature development
- Attacking artificial intelligence and machine learning
- Operation Vigilante – using the red team to fix things
- Emulating real-world advanced persistent threats (APTs)
- Performing tabletop exercises
- Summary
- Questions
- Section 2: Tactics and Techniques
- Chapter 5: Situational Awareness – Mapping Out the Homefield Using Graph Databases
- Chapter 6: Building a Comprehensive Knowledge Graph
- Chapter 7: Hunting for Credentials
-
Chapter 8: Advanced Credential Hunting
- Technical requirements
- Understanding the Pass the Cookie technique
- Credentials in process memory
- Abusing logging and tracing to steal credentials and access tokens
- Windows Credential Manager and macOS Keychain
- Using optical character recognition to find sensitive information in images
- Exploiting the default credentials of local admin accounts
- Phishing attacks and credential dialog spoofing
- Performing password spray attacks
- Summary
- Questions
- Chapter 9: Powerful Automation
-
Chapter 10: Protecting the Pen Tester
- Technical requirements
-
Locking down your machines (shields up)
- Limiting the attack surface on Windows
- Becoming stealthy on macOS and limiting the attack surface
- Configuring the Uncomplicated Firewall on Ubuntu
- Locking down SSH access
- Considering Bluetooth threats
- Keeping an eye on the administrators of your machines
- Using a custom hosts file to send unwanted traffic into a sinkhole
- Keeping a low profile on Office Delve, GSuites, and Facebook for Work
- Securely deleting files and encrypting hard drives
- Improving documentation with custom Hacker Shell prompts
- Monitoring and alerting for logins and login attempts
- Summary
- Questions
-
Chapter 11: Traps, Deceptions, and Honeypots
- Technical requirements
- Actively defending pen testing assets
- Understanding and using Windows Audit ACLs
- Notifications for file audit events on Windows
- Building a Homefield Sentinel – a basic Windows Service for defending hosts
- Monitoring access to honeypot files on Linux
- Alerting for suspicious file access on macOS
- Summary
- Questions
- Chapter 12: Blue Team Tactics for the Red Team
- Assessments
- Another Book You May Enjoy
Product information
- Title: Cybersecurity Attacks – Red Team Strategies
- Author(s):
- Release date: March 2020
- Publisher(s): Packt Publishing
- ISBN: 9781838828868
You might also like
book
Cybersecurity - Attack and Defense Strategies
Updated edition of the bestselling guide for planning attack and defense strategies based on the current …
book
Cybersecurity - Attack and Defense Strategies
Key Features Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior …
book
Cybersecurity – Attack and Defense Strategies - Second Edition
Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats …
video
Cybersecurity Attacks (Red Team Activity)
Learn about the different kinds of cyber attacks and how they can be executed About This …