Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Adversarial Tradecraft in Cybersecurity
Adversarial Tradecraft in Cybersecurity

Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time computer conflict

eBook
£32.99
Paperback
£41.99
Audiobook
£37.99
Subscription
Free Trial
Renews at £9.99p/m

What do you get with Audiobook?

Product feature icon Download a zip folder containing audio files (MP3) and a supplementary PDF
Product feature icon DRM FREE - Listen whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Key benefits

  • Gain an advantage against live hackers in a competition or real computing environment
  • Understand advanced red team and blue team techniques with code examples
  • Learn to battle in short-term memory, whether remaining unseen (red teams) or monitoring an attacker's traffic (blue teams)

Description

Little has been written about what to do when live hackers are on your system and running amok. Even experienced hackers tend to choke up when they realize the network defender has caught them and is zoning in on their implants in real time. This book will provide tips and tricks all along the kill chain of an attack, showing where hackers can have the upper hand in a live conflict and how defenders can outsmart them in this adversarial game of computer cat and mouse. This book contains two subsections in each chapter, specifically focusing on the offensive and defensive teams. It begins by introducing you to adversarial operations and principles of computer conflict where you will explore the core principles of deception, humanity, economy, and more about human-on-human conflicts. Additionally, you will understand everything from planning to setting up infrastructure and tooling that both sides should have in place. Throughout this book, you will learn how to gain an advantage over opponents by disappearing from what they can detect. You will further understand how to blend in, uncover other actors’ motivations and means, and learn to tamper with them to hinder their ability to detect your presence. Finally, you will learn how to gain an advantage through advanced research and thoughtfully concluding an operation. By the end of this book, you will have achieved a solid understanding of cyberattacks from both an attacker’s and a defender’s perspective.

Who is this book for?

Pentesters to red teamers, security operations center analysts to incident responders, attackers, defenders, general hackers, advanced computer users, and security engineers will benefit from this book. Participants in purple teaming or adversarial simulations will also learn a lot from its practical examples of processes for gaining an advantage over the opposing team. Basic knowledge of Python, Go, Bash, PowerShell, system administration as well as knowledge of incident response in Linux and prior exposure to any kind of cybersecurity knowledge, penetration testing, and ethical hacking basics will help you follow along.

What you will learn

  • Understand how to implement process injection and how to detect it
  • Turn the tables on the offense with active defense
  • Disappear on the defender's system, by tampering with defensive sensors
  • Upskill in using deception with your backdoors and countermeasures including honeypots
  • Kick someone else from a computer you are on and gain the upper hand
  • Adopt a language agnostic approach to become familiar with techniques that can be applied to both the red and blue teams
  • Prepare yourself for real-time cybersecurity conflict by using some of the best techniques currently in the industry

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Jun 14, 2021
Length: 8hrs 1min
Edition : 1st
Language : English
ISBN-13 : 9781801812818
Category :
Concepts :

What do you get with Audiobook?

Product feature icon Download a zip folder containing audio files (MP3) and a supplementary PDF
Product feature icon DRM FREE - Listen whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Product Details

Publication date : Jun 14, 2021
Length: 8hrs 1min
Edition : 1st
Language : English
ISBN-13 : 9781801812818
Category :
Concepts :

Packt Subscriptions

See our plans and pricing
Modal Close icon
£9.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 6,500+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
£99.99 billed annually
Feature tick icon Unlimited access to Packt's library of 6,500+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just £5 each
Feature tick icon Exclusive print discounts
£139.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 6,500+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just £5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total £ 125.97
Malware Analysis Techniques
£41.99
Adversarial Tradecraft in Cybersecurity
£41.99
Privilege Escalation Techniques
£41.99
Total £ 125.97 Stars icon
Visually different images

Table of Contents

10 Chapters
Theory on Adversarial Operations and Principles of Computer Conflict Chevron down icon Chevron up icon
Preparing for Battle Chevron down icon Chevron up icon
Invisible is Best (Operating in Memory) Chevron down icon Chevron up icon
Blending In Chevron down icon Chevron up icon
Active Manipulation Chevron down icon Chevron up icon
Real-Time Conflict Chevron down icon Chevron up icon
The Research Advantage Chevron down icon Chevron up icon
Clearing the Field Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon
Index Chevron down icon Chevron up icon

Customer reviews

Top Reviews
Rating distribution
Full star icon Full star icon Full star icon Full star icon Half star icon 4.9
(43 Ratings)
5 star 95.3%
4 star 2.3%
3 star 0%
2 star 2.3%
1 star 0%
Filter icon Filter
Top Reviews

Filter reviews by




Rachel E Dec 29, 2021
Full star icon Full star icon Full star icon Full star icon Full star icon 5
PROS:1) The author does a really good job of balancing high-level security concepts with low-level techniques. He does this by focusing on principles and using his experience to break-down how the techniques have changed yet the fundamental principles stay the same. I am often worried about buying tech books because of how quickly they become out of date. I don't think this will be an issue with this book because of how it is written.2) The book is loaded with nuggets of wisdom and the author's industry experience really shines through.3) The book also strikes a balance between offense & defense and the difference between long-term and short-term engagements.4) The author provides a ton of great resources for you to check out, yet it can be read without visiting those resources (Some books require you to visit a ton of online resources to get through the material and I realize I would have rather have as an ebook because of the effort to switch back and forth. I liked reading the physical copy of the book).5) I learned a ton! I think this is most important :)CONS1) I don't think you a lot of prerequisite knowledge to read this book, but I think it would be difficult for an absolute newbie.
Amazon Verified review Amazon
A Jul 11, 2021
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This was an outstanding book! I highly recommend it for both new and experienced infosec engineers. The book is crammed with helpful theory and realistic attacks, as well as being useful to both blue teams and red teams alike.
Amazon Verified review Amazon
Ben Wabschall Feb 27, 2022
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This book is beautifully presented and provides a valuable take on the intricacies of the growing field of cyber security. Bravo to Dan Borges!
Amazon Verified review Amazon
Kaitlyn Apr 30, 2023
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This is one of the best books on advance red team tradecraft. You need this book if you want to go beyond being a loud attacker who gets caught. You want to be invisible and not leave logs. This book will teach you stealth.
Amazon Verified review Amazon
Dr. Roderick Arthur - Security Operations at Confidential Jul 05, 2021
Full star icon Full star icon Full star icon Full star icon Full star icon 5
I recently received a review copy of Adversarial Tradecraft in Cybersecurity by Dan Borges, and found myself tempted to skip ahead to what I considered the more fun, hands-on stuff, but even the beginning of the book captured my interest. The book is a great read for the average reader as well as cybersecurity professionals interested in the world of cyber conflict. In Chapter One, Borges explores both sides of cyber conflict, from attacker and defender perspectives, as well as associates the cybersecurity profession as a sort of a high stakes game between both parties. Throughout the book, Borges explains the use of an analog form of the still useful kill chain, known as attack trees, which is a conceptual flow diagram of how a target may be attacked.The book is designed for InfoSec attack and defense competitions, but the strategies discussed can be utilized by incident responders for real-world security incidents. In fact, Borges suggests installing a virtual box with Kali Linux and Metasploit to experiment with the exploits and techniques discussed in the book (which I started but using my favorite app, which is VMWare). Practitioners involved in security ops will find this book extremely useful and educational, and is easily a five star read!Dr. Rod Arthur
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an audiobook? Chevron down icon Chevron up icon

Where there is an audiobook version of a title available, you can buy it from the book details for that title. Your audiobook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalized audiobook download file.

Clicking the link will download the audiobook in a ZIP file. Unzip the ZIP file to your desired location to access the audiobook’s .mp3 files. You may play these .mp3 files on any supported player or device of your choice.

Please Note: Packt audiobooks are non-returnable and non-refundable.

Packt audiobook and Licensing: When you buy an audiobook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it, we have tried to balance the need for the audiobook to be usable for you the listener with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your audiobook for your own use onto any machine
  • You may not pass copies of the audiobook on to anyone else

How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, audiobook, eBook, or Bundle (Print+eBook) please follow the below steps:

  1. Register on our website using your email address and password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title.
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Card, or PayPal)

Where can I access support around an audiobook? Chevron down icon Chevron up icon

  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us

What are the benefits of audiobooks? Chevron down icon Chevron up icon

  • You can get the information you need immediately
  • You can easily take them with you on a laptop or mobile device
  • You can download them an unlimited number of times
  • There is no password protection
  • They save resources and space
  • You can multitask while listening to audiobooks
  • What is an audiobook? Chevron down icon Chevron up icon

    An audiobook, also known as a talking book, is a recorded version of a book where the content is read aloud.