Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Cybersecurity Attacks – Red Team Strategies

You're reading from  Cybersecurity Attacks ‚Äì Red Team Strategies

Product type Book
Published in Mar 2020
Publisher Packt
ISBN-13 9781838828868
Pages 524 pages
Edition 1st Edition
Languages
Author (1):
Johann Rehberger Johann Rehberger
Profile icon Johann Rehberger

Table of Contents (17) Chapters

Preface 1. Section 1: Embracing the Red
2. Chapter 1: Establishing an Offensive Security Program 3. Chapter 2: Managing an Offensive Security Team 4. Chapter 3: Measuring an Offensive Security Program 5. Chapter 4: Progressive Red Teaming Operations 6. Section 2: Tactics and Techniques
7. Chapter 5: Situational Awareness – Mapping Out the Homefield Using Graph Databases 8. Chapter 6: Building a Comprehensive Knowledge Graph 9. Chapter 7: Hunting for Credentials 10. Chapter 8: Advanced Credential Hunting 11. Chapter 9: Powerful Automation 12. Chapter 10: Protecting the Pen Tester 13. Chapter 11: Traps, Deceptions, and Honeypots 14. Chapter 12: Blue Team Tactics for the Red Team 15. Assessments 16. Another Book You May Enjoy

Threats – trees and graphs

Threat, or attack, trees break down the anatomy of how a component might be compromised. They help analyze how an asset might be attacked by breaking down individual attack steps into smaller sub-steps. Some of the first work exploring these concepts in computer security was apparently done by Amoroso in Fundamentals of Computer Security Technology (1994), and a few years later by Schneier (https://www.schneier.com/academic/archives/1999/12/attack_trees.html).

On paper, an attack tree seems like a great idea; it allows you to break down an attack into detailed steps toward achieving an objective. However, using this technique one might end up with many attack trees, which can be hard to manage. Hence, tooling is needed.

How about graphs? Modeling adversarial behavior and associated threats and relationships between components using graphs can be a powerful way to explore connections between systems and components.

One possible way to measure...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}