Details
The Active Defender
Immersion in the Offensive Security MindsetTech Today 1. Aufl.
21,99 € |
|
Verlag: | Wiley |
Format: | |
Veröffentl.: | 20.06.2023 |
ISBN/EAN: | 9781119895220 |
Sprache: | englisch |
Anzahl Seiten: | 272 |
DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.
Beschreibungen
<p><b>Immerse yourself in the offensive security mindset to better defend against attacks</b></p> <p>In <i>The Active Defender: Immersion in the Offensive Security Mindset</i>, Principal Technology Architect, Security, Dr. Catherine J. Ullman delivers an expert treatment of the Active Defender approach to information security. In the book, you’ll learn to understand and embrace the knowledge you can gain from the offensive security community. You’ll become familiar with the hacker mindset, which allows you to gain emergent insight into how attackers operate and better grasp the nature of the risks and threats in your environment.</p> <p>The author immerses you in the hacker mindset and the offensive security culture to better prepare you to defend against threats of all kinds. You’ll also find:</p> <ul> <li>Explanations of what an Active Defender is and how that differs from traditional defense models</li> <li>Reasons why thinking like a hacker makes you a better defender</li> <li>Ways to begin your journey as an Active Defender and leverage the hacker mindset</li> </ul> <p>An insightful and original book representing a new and effective approach to cybersecurity, <i>The Active Defender</i> will be of significant benefit to information security professionals, system administrators, network administrators, and other tech professionals with an interest or stake in their organization’s information security.</p>
<p>Foreword xxv</p> <p>Preface xxix</p> <p>Introduction xxxiii</p> <p><b>Chapter 1 What Is an Active Defender? 1</b></p> <p>The Hacker Mindset 1</p> <p>Traditional Defender Mindset 3</p> <p>Getting from Here to There 4</p> <p>Active Defender Activities 7</p> <p>Threat Modeling 7</p> <p>Threat Hunting 8</p> <p>Attack Simulations 9</p> <p>Active Defense 9</p> <p>“Active Defense” for the Active Defender 10</p> <p>Another Take on Active Defense 10</p> <p>Annoyance 11</p> <p>Attribution 11</p> <p>Attack 11</p> <p>Active Defense According to Security Vendors 11</p> <p>Active > Passive 12</p> <p>Active Defense by the Numbers 13</p> <p>Active Defense and Staffing 13</p> <p>Active Defender > Passive Defender 13</p> <p>Relevant Intel Recognition 13</p> <p>Understanding Existing Threats 14</p> <p>Attacker Behavior 14</p> <p>Pyramid of Pain 15</p> <p>MITRE Att&ck 15</p> <p>TTP Pyramid 15</p> <p>Toward a Deeper Understanding 16</p> <p>Return to the Beginning 16</p> <p>Summary 18</p> <p>Notes 18</p> <p><b>Chapter 2 Immersion into the Hacker Mindset 21</b></p> <p>Reluctance 21</p> <p>Media Portrayal 21</p> <p>Fear of Government Retribution 22</p> <p>The Rock Star Myth 22</p> <p>Imposter Syndrome 23</p> <p>A Leap of Faith 23</p> <p>My First Security BSides 24</p> <p>My First DEF CON 24</p> <p>Finding the Community 27</p> <p>Security BSides 27</p> <p>Structured Format 27</p> <p>Unconference Format 28</p> <p>Hybrid Format 28</p> <p>Additional Events 28</p> <p>Other Security Conferences 29</p> <p>CircleCityCon 29</p> <p>GrrCON 29</p> <p>Thotcon 29</p> <p>ShmooCon 30</p> <p>Wild West Hackin’ Fest 30</p> <p>DEF Con 30</p> <p>Local Security Meetups 30</p> <p>Infosec 716 31</p> <p>Burbsec 31</p> <p>#misec 31</p> <p>Makerspaces 31</p> <p>DEF CON Groups 32</p> <p>2600 Meetings 32</p> <p>Online Security Communities 33</p> <p>Traditional Security Communities 34</p> <p>An Invitation 34</p> <p>Summary 36</p> <p>Notes 36</p> <p><b>Chapter 3 Offensive Security Engagements, Trainings, and Gathering Intel 37</b></p> <p>Offensive Security Engagements 37</p> <p>Targeting 38</p> <p>Initial Access 38</p> <p>Persistence 39</p> <p>Expansion 39</p> <p>Exfiltration 40</p> <p>Detection 40</p> <p>Offensive Security Trainings 40</p> <p>Conference Trainings 41</p> <p>Security BSides 41</p> <p>DEF Con 42</p> <p>GrrCON 42</p> <p>Thotcon 43</p> <p>CircleCityCon 43</p> <p>Wild West Hackin’ Fest 43</p> <p>Black Hat 44</p> <p>Security Companies 44</p> <p>Offensive Security 44</p> <p>TrustedSec 44</p> <p>Antisyphon 45</p> <p>SANS 45</p> <p>Online Options 46</p> <p>Hackthebox 46</p> <p>Tryhackme 46</p> <p>Hackthissite 47</p> <p>CTFs 47</p> <p>YouTube 47</p> <p>Higher Education 48</p> <p>Gathering Intel 48</p> <p>Tradecraft Intel 49</p> <p>Project Zero 49</p> <p>AttackerKB 49</p> <p>Discord/Slack 50</p> <p>Twitter 50</p> <p>Organizational Intel 51</p> <p>LinkedIn 51</p> <p>Pastebin 52</p> <p>GitHub 52</p> <p>Message Boards 52</p> <p>Internal Wikis 53</p> <p>Haveibeenpwned 53</p> <p>Summary 54</p> <p>Notes 54</p> <p><b>Chapter 4 Understanding the Offensive Toolset 55</b></p> <p>Nmap/Zenmap 57</p> <p>Burp Suite/ZAP 59</p> <p>sqlmap 60</p> <p>Wireshark 61</p> <p>Metasploit Framework 63</p> <p>Shodan 64</p> <p>Social-Engineer Toolkit 66</p> <p>Mimikatz 67</p> <p>Responder 70</p> <p>Cobalt Strike 71</p> <p>Impacket 73</p> <p>Mitm6 75</p> <p>CrackMapExec 76</p> <p>evil-winrm 77</p> <p>BloodHound/SharpHound 78</p> <p>Summary 79</p> <p>Notes 80</p> <p><b>Chapter 5 Implementing Defense While Thinking Like a Hacker 81</b></p> <p>OSINT for Organizations 81</p> <p>OPSEC 82</p> <p>OSINT 82</p> <p>Social Engineering 82</p> <p>Actively Defending 84</p> <p>ASM 84</p> <p>ATO Prevention 84</p> <p>Benefits 86</p> <p>Types of Risks Mitigated 86</p> <p>Threat Modeling Revisited 87</p> <p>Framing the Engagement 87</p> <p>Scoping in Frame 87</p> <p>Motivation in Frame 88</p> <p>The Right Way In 88</p> <p>Reverse Engineering 88</p> <p>Targeting 89</p> <p>Inbound Access 89</p> <p>Persistence 89</p> <p>Egress Controls 90</p> <p>LOLBins 90</p> <p>Rundll32.exe 91</p> <p>Regsvr32.exe 91</p> <p>MSbuild.exe 92</p> <p>Cscript.exe 92</p> <p>Csc.exe 92</p> <p>Legitimate Usage? 92</p> <p>Threat Hunting 93</p> <p>Begin with a Question 93</p> <p>The Hunt 94</p> <p>Applying the Concepts 94</p> <p>Dumping Memory 95</p> <p>Lateral Movement 95</p> <p>Secondary C2 96</p> <p>Proof of Concept 97</p> <p>Attack Simulations 97</p> <p>Simulation vs. Emulation 97</p> <p>Why Test? 98</p> <p>Risky Assumptions 99</p> <p>Practice Is Key 100</p> <p>Tools for Testing 100</p> <p>Microsoft Defender for O365 101</p> <p>Atomic Red Team 102</p> <p>Caldera 103</p> <p>Scythe 103</p> <p>Summary 104</p> <p>Notes 104</p> <p><b>Chapter 6 Becoming an Advanced Active Defender 107</b></p> <p>The Advanced Active Defender 107</p> <p>Automated Attack Emulations 108</p> <p>Using Deceptive Technologies 108</p> <p>Honey Tokens 109</p> <p>Decoy Accounts 109</p> <p>Email Addresses 110</p> <p>Database Data 110</p> <p>AWS Keys 111</p> <p>Canary Tokens 111</p> <p>Honeypots 111</p> <p>Other Forms of Deception 112</p> <p>Web Server Header 112</p> <p>User Agent Strings 113</p> <p>Fake DNS Records 113</p> <p>Working with Offensive Security Teams 114</p> <p>But We Need a PenTest! 114</p> <p>Potential Testing Outcomes 115</p> <p>Vulnerability Identification 116</p> <p>Vulnerability Exploitation 116</p> <p>Targeted Detection/Response 116</p> <p>Real Threat Actor 117</p> <p>Detection Analysis 117</p> <p>Scope 117</p> <p>Scoping Challenges 118</p> <p>Additional Scope Considerations 118</p> <p>Decisions, Decisions 119</p> <p>Measuring Existing Defenses 119</p> <p>Crown Jewels 119</p> <p>Selecting a Vendor 120</p> <p>Reputation 120</p> <p>Experience and Expertise 121</p> <p>Processes 121</p> <p>Data Security 122</p> <p>Adversarial Attitudes 122</p> <p>Results 123</p> <p>Additional Considerations 123</p> <p>Purple Teaming – Collaborative Testing 124</p> <p>What Is a Purple Team? 124</p> <p>Purple Team Exercises 125</p> <p>Cyber Threat Intelligence 125</p> <p>Preparation 126</p> <p>Exercise Execution 126</p> <p>Lessons Learned 127</p> <p>Purple Teams and Advanced Active Defenders 127</p> <p>Summary 127</p> <p>Notes 128</p> <p><b>Chapter 7 Building Effective Detections 129</b></p> <p>Purpose of Detection 129</p> <p>Funnel of Fidelity 130</p> <p>Collection 130</p> <p>Detection 130</p> <p>Triage 131</p> <p>Investigation 131</p> <p>Remediation 131</p> <p>Building Detections: Identification and Classification 131</p> <p>Overall Detection Challenges 132</p> <p>Attention Problem 132</p> <p>Perception Problem 133</p> <p>Abstraction Problem 134</p> <p>Validation Problem 135</p> <p>The Pyramids Return 135</p> <p>Lower Levels 136</p> <p>Tools 137</p> <p>Wrong Viewpoint 137</p> <p>Bypass Options 138</p> <p>Higher Levels 139</p> <p>Testing 140</p> <p>Literal Level 140</p> <p>Functional Level 140</p> <p>Operational Level 141</p> <p>Technical Level 142</p> <p>Proper Validation: Both Telemetry and Detection 143</p> <p>Telemetry Coverage 143</p> <p>Detection Coverage 144</p> <p>Testing Solutions 144</p> <p>Atomic Red Team 144</p> <p>AtomicTestHarness 145</p> <p>Summary 146</p> <p>Notes 147</p> <p><b>Chapter 8 Actively Defending Cloud Computing Environments 149</b></p> <p>Cloud Service Models 150</p> <p>IaaS 150</p> <p>PaaS 150</p> <p>SaaS 150</p> <p>Cloud Deployment Environments 151</p> <p>Private Cloud 151</p> <p>Public Cloud 151</p> <p>Fundamental Differences 151</p> <p>On-Demand Infrastructure 152</p> <p>Shared Responsibility Model 152</p> <p>Control Plane and Data Plane 153</p> <p>Infrastructure as an API 154</p> <p>Data Center Mapping 154</p> <p>IAM Focus 155</p> <p>Cloud Security Implications 157</p> <p>Larger Attack Surface 158</p> <p>New Types of Exposed Services 158</p> <p>Application Security Emphasis 159</p> <p>Challenges with API Use 160</p> <p>Custom Applications 161</p> <p>Cloud Offensive Security 161</p> <p>Enumeration of Cloud Environments 162</p> <p>Code Repositories 162</p> <p>Publicly Accessible Resources 163</p> <p>Initial Access 164</p> <p>Phishing/Password Spraying 164</p> <p>Stealing Access Tokens 164</p> <p>Resource Exploitation 165</p> <p>Post-Compromise Recon 165</p> <p>Post-Exploitation Enumeration 166</p> <p>Roles, Policies, and Permissions 166</p> <p>Dangerous Implied Trusts 166</p> <p>Overly Permissive Configurations 170</p> <p>Multi-Level Access 170</p> <p>Persistence/Expansion 171</p> <p>Lateral Movement 172</p> <p>Privilege Escalation 173</p> <p>Defense Strategies 175</p> <p>Summary 175</p> <p>Notes 176</p> <p><b>Chapter 9 Future Challenges 179</b></p> <p>Software Supply Chain Attacks 179</p> <p>A Growing Problem 180</p> <p>Actively Defending 180</p> <p>Counterfeit Hardware 181</p> <p>Fake CISCO Hardware 181</p> <p>Actively Defending 182</p> <p>UEFI 182</p> <p>Increasing Vulnerabilities 182</p> <p>Enter BlackLotus 183</p> <p>MSI Key Leak 184</p> <p>Actively Defending 185</p> <p>BYOVD Attacks 185</p> <p>Lazarus Group 186</p> <p>Cuba Ransomware Group 186</p> <p>Actively Defending 186</p> <p>Ransomware 186</p> <p>Continuing Evolution 187</p> <p>Actively Defending 187</p> <p>Tabletop Exercises 188</p> <p>Ransomware Playbooks 189</p> <p>Frameworks 191</p> <p>Cobalt Strike 192</p> <p>Silver 192</p> <p>Metasploit 192</p> <p>Brute Ratel 193</p> <p>Havoc 193</p> <p>Mythic 193</p> <p>Actively Defending 194</p> <p>Living Off the Land 194</p> <p>Actively Defending 195</p> <p>API Security 195</p> <p>Defining APIs 195</p> <p>API Impact 196</p> <p>Security Significance 196</p> <p>Actively Defending 196</p> <p>Everything Old Is New Again 197</p> <p>OWASP Top 10 197</p> <p>Old Malware Never (Really) Dies 198</p> <p>Emotet 198</p> <p>REvil 199</p> <p>Actively Defending 199</p> <p>Summary 200</p> <p>Notes 201</p> <p>Index 203</p>
<p><B>CATHERINE J. ULLMAN</B> is a security researcher, speaker, and Principal Technology Architect, Security at the University at Buffalo. She is a DFIR specialist and expert in incident management, intrusion detection, investigative services, and personnel case resolution. She offers security awareness training in an academic setting and is a well-known presenter at information security conferences, including DEF CON and Blue Team Con. <p>
<p><b>An immersive and thought-provoking discussion of the Active Defender approach to cybersecurity</b> <p>In <i>The Active Defender: Immersion in the Offensive Security Mindset</i>, Senior Information Security Forensic Analyst Dr. Catherine J. Ullman delivers an eye-opening discussion of the Active Defender approach to information security. The author demonstrates the tremendous utility of the hacker mindset and offers emergent insights into how attackers operate so you can better grasp the nature of the risks and threats in your unique environment. <p>In the book, you’ll be immersed in hacker and offensive security culture as you prepare to face your organization’s real-world security challenges. You’ll learn what an Active Defender is, how they differ from traditional defensive actors, and why they’re better equipped to handle unpredictable and destructive security threats. You’ll also discover how you can best begin your journey as an Active Defender. <p>An insightful, unique, and original perspective on the effective implementation of cybersecurity, <i>The Active Defender</i> will prove invaluable to information security professionals, network and system administrators, and other tech practitioners with a substantial stake in their organization’s technical and information security.
Diese Produkte könnten Sie auch interessieren:
Computation in BioInformatics
von: S. Balamurugan, Anand T. Krishnan, Dinesh Goyal, Balakumar Chandrasekaran, Boomi Pandi

187,99 €