This Book is a comprehensive guide to building and managing a red team program within an organization. The text covers essential topics such as defining the mission of a red team, gaining leadership support, building a program from scratch or inheriting an existing one, and managing and assessing the team. It explores the importance of "homefield advantage" and the collaborative approach between red and blue teams. The book provides numerous examples of real-world adversary tactics and techniques, including phishing attacks, credential hunting, and abusing logging and tracing to steal information. The text delves into the use of graph databases and attack graphs to map out the organization's assets and relationships, and it emphasizes the importance of security monitoring and alerting to detect and respond to threats effectively. Finally, the book discusses blue team tactics that red teamers should be familiar with, including centralized monitoring solutions like osquery and the Elasticsearch Stack.
You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary
Get the Book now from Amazon:
https://www.amazon.com/Cybersecurity-Attacks-Strategies-practical-penetration/dp/1838828869?&linkCode=ll1&tag=cvthunderx-20&linkId=5d644c69621ad15774cfe3aea7ce0570&language=en_US&ref_=as_li_ss_tl