Learning by Practicing - Hack and Detect

Learning by Practicing - Hack and Detect
Author :
Publisher :
Total Pages : 410
Release :
ISBN-10 : 1731254458
ISBN-13 : 9781731254450
Rating : 4/5 (450 Downloads)

Book Synopsis Learning by Practicing - Hack and Detect by : Nik Alleyne

Download or read book Learning by Practicing - Hack and Detect written by Nik Alleyne and published by . This book was released on 2018-11-12 with total page 410 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book leverages the Cyber Kill Chain to teach you how to hack and detect, from a network forensics perspective. Thus lots of packet and log analysis! There are lots of books that teach you how to hack. So the main purpose of this book is not really about hacking. However, the problem with many of those books, is they don''t teach you how to detect your activities. This means, you the reader have to go read another book, in order to understand the traces of network evidence, indicators of compromise (IoC), events of interests (EoI) and the breadcrumbs which are left behind, as part of your activities related to system compromise. Therefore, this book is truly meant to help you the reader detect sooner, whenever someone compromises your network. Remember, it is not if you will be compromised but when. This statement is assuming you have not already been compromised. To ensure you enjoy this book, it is written from the perspective of storytelling. While most technology related books are done from a how-to guide style, this one is not. However, the objectives remain the same. I believe tying the technical material in with a story, will add more context, make the message clearer and the learning process easier. An important note, as Neysa (Threat Actor) hacks, she plans to use the Lockheed Martin Cyber Kill Chain model as her framework. By leveraging the Cyber Kill Chain, she anticipates she can operate similar to an advanced persistent threat (APT). Where possible, she will follow the model exactly as it is. However, where needed, she may deviate while still being focused on achieving the actions and objectives as identified by the Cyber Kill Chain. For each of the attacks Neysa (Threat Actor) performs, where possible, Nakia (newly hired Cybersecurity Ninja) will leverage her Cybersecurity Ninja awesomeness, to detect Neysa''s actions. More importantly, for each of the attacks that Nakia detects, she must provide answers to the who, what, when, where, why and how to Saadia, the owner of SecurityNik Inc. These are critical questions every incident handler must answer. Now, the reality is, in many cases you may not be able to tell "why" it happened, as you don''t typically know your adversaries motive. However, Nakia will do her best to provide the necessary guidance, thus ensuring she gives Saadia actionable intelligence to decide on the way forward. Here is why you should get this book. Nik''s approach to viewing both the attacker and defender''s side of the compromise is an amazing way to correlate the causes and consequences of every action in an attack. This not only helps the reader learn, but is entertaining and will cause readers to flip all around the book to make sure they catch every detail. Tyler Hudak, Information Security By showing both the offensive and defensive sides of an attack, Nik helps each side better understand how the other operates. Joe Schottman, SANS Advisory Board Member Hack and Detect provides a window into a modern day attack from an advanced persistent threat in an easy to follow story format. Nik walks through the Cyber Kill Chain from both an offensive perspective, showing tools and tricks an attacker would leverage, and a defensive perspective, highlighting the breadcrumbs which are left behind. By following along step by step with virtual machines the reader is able to obtain a greater understanding of how the attacks work in the real world and gain valuable insight into defending against them. Daniel McAuley, Manager Infrastructure and Technology Group Looking to follow along without building a lab? I got you! Grab the full set of pcaps, logs, etc from my GitHub page at https://github.com/SecurityNik/SUWtHEh- Looking for sample chapters? You''re covered here too!!:http://bit.ly/NikAlleyne-Hack-and-Detect-Book www.securitynik.com


Learning by Practicing - Hack and Detect Related Books

Learning by Practicing - Hack and Detect
Language: en
Pages: 410
Authors: Nik Alleyne
Categories:
Type: BOOK - Published: 2018-11-12 - Publisher:

DOWNLOAD EBOOK

This book leverages the Cyber Kill Chain to teach you how to hack and detect, from a network forensics perspective. Thus lots of packet and log analysis! There
Learning by Practicing - Mastering TShark Network Forensics
Language: en
Pages: 174
Authors: Nik Alleyne
Categories:
Type: BOOK - Published: 2020-06 - Publisher:

DOWNLOAD EBOOK

The book you have been waiting for to make you a Master of TShark Network Forensics, is finally here!!! Be it you are a Network Engineer, a Network Forensics An
Learn Ethical Hacking from Scratch
Language: en
Pages: 549
Authors: Zaid Sabih
Categories: Computers
Type: BOOK - Published: 2018-07-31 - Publisher: Packt Publishing Ltd

DOWNLOAD EBOOK

Learn how to hack systems like black hat hackers and secure them like security experts Key Features Understand how computer systems work and their vulnerabiliti
The Basics of Hacking and Penetration Testing
Language: en
Pages: 223
Authors: Patrick Engebretson
Categories: Computers
Type: BOOK - Published: 2013-06-24 - Publisher: Elsevier

DOWNLOAD EBOOK

The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethi
Bayesian Methods for Hackers
Language: en
Pages: 551
Authors: Cameron Davidson-Pilon
Categories: Computers
Type: BOOK - Published: 2015-09-30 - Publisher: Addison-Wesley Professional

DOWNLOAD EBOOK

Master Bayesian Inference through Practical Examples and Computation–Without Advanced Mathematical Analysis Bayesian methods of inference are deeply natural a