Hands-On Red Team Tactics
RedTeamingisusedtoenhancesecuritybyperformingsimulatedattacksonanorganizationinordertodetectnetworkandsystemvulnerabilities.Hands-OnRedTeamTacticsstartswithanoverviewofpentestingandRedTeaming,beforegivingyouanintroductiontofewofthelatestpentestingtools.WewillthenmoveontoexploringMetasploitandgettingtogripswithArmitage.Onceyouhavestudiedthefundamentals,youwilllearnhowtouseCobaltStrikeandhowtosetupitsteamserver.ThebookintroducessomecommonlesserknowntechniquesforpivotingandhowtopivotoverSSH,beforeusingCobaltStriketopivot.Thiscomprehensiveguidedemonstratesadvancedmethodsofpost-exploitationusingCobaltStrikeandintroducesyoutoCommandandControl(C2)serversandredirectors.Allthiswillhelpyouachievepersistenceusingbeaconsanddataexfiltration,andwillalsogiveyouthechancetorunthroughthemethodologytouseRedTeamactivitytoolssuchasEmpireduringaRedTeamactivityonActiveDirectoryandDomainController.Inadditiontothis,youwillexploremaintainingpersistentaccess,stayinguntraceable,andgettingreverseconnectionsoverdifferentC2covertchannels.Bytheendofthisbook,youwillhavelearnedaboutadvancedpenetrationtestingtools,techniquestogetreverseshellsoverencryptedchannels,andprocessesforpost-exploitation.
·4.5萬字