The Survival Guide to Maintaining Access and Evading Detection Post-Exploitation

The Survival Guide to Maintaining Access and Evading Detection Post-Exploitation

by Josh Luberisse
The Survival Guide to Maintaining Access and Evading Detection Post-Exploitation

The Survival Guide to Maintaining Access and Evading Detection Post-Exploitation

by Josh Luberisse

eBook

$9.99 

Available on Compatible NOOK Devices and the free NOOK Apps.
WANT A NOOK?  Explore Now

Related collections and offers

LEND ME® See Details

Overview

In the intricate dance of cyber warfare, the act of gaining unauthorized access is merely the first step. The real artistry lies in staying undetected, maintaining that access, and achieving objectives without raising alarms. "The Survival Guide to Maintaining Access and Evading Detection Post-Exploitation" delves deep into this complex and ever-evolving realm of post-exploitation in cybersecurity.

From the renowned experts at Greyhat Intelligence & Investigative Solutions, this comprehensive guide reveals the hidden nuances of post-exploitation activities. Learn how threat actors secure their foothold, escalate privileges, and maneuver through networks undetected. Discover the tactics, techniques, and procedures (TTPs) that distinguish an amateur attacker from a seasoned professional.

Each chapter of the guide offers a meticulously researched look into distinct aspects of post-exploitation:

- Grasp the importance of **maintaining access** within compromised systems and the myriad methods employed to persist through reboots, updates, and other adversities.

- Delve into the art of **evading detection**, a critical skill in a world where enterprises are investing heavily in fortifying their cyber defenses.

- Explore the "live off the land" philosophy, leveraging legitimate tools and native system features for clandestine operations, sidestepping the common detection avenues.

- Navigate through advanced realms of cyber-attacks, such as **tunneling**, **pivoting**, and memory-resident malware, and understand the counter-forensic measures that elite hackers employ.

- Equip yourself with the latest strategies to defend against these surreptitious techniques. Learn how to harden systems, enhance detection capabilities, and respond effectively when breaches occur.

- Reflect on the ethical dimensions of post-exploitation and the evolving global legal landscape that shapes this domain. Plus, anticipate the future challenges and opportunities that emerging technologies bring to the post-exploitation scene.

Bolstered by real-world case studies, detailed toolkits, and a glossary of terms, this book is an essential resource for cybersecurity professionals, digital forensics experts, and IT personnel. Whether you're looking to safeguard your organization's digital assets, enhance your penetration testing skills, or understand the adversary's playbook, "The Survival Guide to Maintaining Access and Evading Detection Post-Exploitation" is the definitive compendium you need in your arsenal.

Product Details

BN ID: 2940186096962
Publisher: Fortis Novum Mundum
Publication date: 08/24/2023
Sold by: Barnes & Noble
Format: eBook
File size: 782 KB

About the Author

Josh is a data scientist and a prolific author of books on artificial intelligence, geopolitics, finance and cybersecurity. With several books on these subjects under his belt, Josh has established himself as a thought leader in the field. His most recent books, “Silent Wars: Espionage, Sabotage, and the Covert Battles in Cyberspace”, ”Silicon and Rare Earth: The Global Contest for Semiconductor and Rare Earth Supremacy", “The Art of Exploit Development: A Practical Guide to Writing Custom Exploits for Red Teamers”, “The Ethical Hacker’s Handbook: A Comprehensive Guide to Cybersecurity Assessment”, "Leave No Trace: A Red Teamer's Guide to Zero-Click Exploits", “Private Armies, Public Wars: The Brave New World of Private Military Companies’ ‘Machinery of War: A Comprehensive Study of the Post-9/11 Global Arms Trade’ and “The Art of War in the 21st Century: Timeless Principles for Modern Military Strategy” highlight his deep understanding of the historically unprecedented impact that emerging technologies are poised to have on our future. 

In addition to being an author, Josh is the host of Innovate Now: The Pulse of Future Technologies, a podcast that explores the fascinating world of emerging technologies and the future of innovation by delving into the most groundbreaking advancements in AI, fintech, distributed and quantum computing. As the founder of a number of startup companies including one that is focused on AI research and another that provides cybersecurity consulting services, Josh is also a seasoned practitioner.

Josh’s expertise and passion have made him a sought-after speaker and consultant, and his contributions have been widely recognized and appreciated. Whether through his books, his work with clients, or his field assignments, Josh continues to inspire and educate others in the hope of making a lasting impact on the world. If you're looking for practical and actionable insights be sure to check out Josh’s other manuscripts and join his community of readers and followers.
From the B&N Reads Blog

Customer Reviews