Muutke küpsiste eelistusi

Evasion Engineering: Building Custom Tools to Evade Modern Detection [Pehme köide]

  • Formaat: Paperback / softback, 256 pages, kõrgus x laius: 235x178 mm, kaal: 369 g
  • Ilmumisaeg: 07-Jul-2026
  • Kirjastus: No Starch Press,US
  • ISBN-10: 1718505043
  • ISBN-13: 9781718505049
Teised raamatud teemal:
  • Pehme köide
  • Hind: 75,89 €
  • See raamat ei ole veel ilmunud. Raamatu kohalejõudmiseks kulub orienteeruvalt 3-4 nädalat peale raamatu väljaandmist.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 256 pages, kõrgus x laius: 235x178 mm, kaal: 369 g
  • Ilmumisaeg: 07-Jul-2026
  • Kirjastus: No Starch Press,US
  • ISBN-10: 1718505043
  • ISBN-13: 9781718505049
Teised raamatud teemal:
Modern enterprises are saturated with telemetry. Endpoint agents, centralized logging, behavioral analytics, and automated detections have made off-the-shelf red team tools increasingly brittle and predictable. Most red team tools fail not because they're buggy, but because they behave in ways detection systems are designed to notice. Red Team Tool Development teaches readers how to think, design, and build differently. Instead of showing how to run popular frameworks, this book focuses on how offensive tools actually behave in monitored environments and why that behavior so often gives them away. The authors walk readers through the foundations of detection-aware tool design, explaining how payload structure, execution flow, and environmental interaction influence visibility across modern detection stacks. Each chapter centers on modular, adaptable examples that show not just what works, but why it works. Readers learn how small design decisions surface in logs, alerts, and behavioral analytics, and how thoughtful toolcraft can reduce detection while still achieving realistic adversary objectives. The result is a field-ready reference for red teamers who need to build their own tools when public ones fail, and for detection engineers and threat hunters who want a clearer view of how advanced operators design tooling to evade automated defenses.
Foreword
Acknowledgments
Introduction

Part I: Red Teaming Fundamentals
Chapter 1: Principles of Application Design and Development
Chapter 2: Evasion Strategies

Part II: Hands-On Evasive Tool Development
Chapter 3: Enumerating with Traffic Redirection
Chapter 4: Developing Command-and-Control Implants
Chapter 5: Creating Lateral Exploits with Worms
Chapter 6: Enumerating Locally Without LOLBins
Chapter 7: Bypassing Detection with Hybrid Packing
Chapter 8: Staging and Exfiltrating Data Covertly

Part III: Testing and Validation
Chapter 9: Building Detection Tools
Chapter 10: Executing Controlled Reveals

Appendix: Technical Requirements
Index
Dennis Chow has worked in penetration testing, cloud security, and detection engineering across Amazon Web Services, UKG, and multiple Fortune 500 companies and US government agencies. He holds the GIAC Security Expert (GSE) certification.

Michael LaSalvia has more than two decades of experience in offensive security and red teaming. Currently a manager of adversarial simulation at Protiviti, he has built and led red team programs for global enterprises including Fidelity National Financial, KPMG, Pfizer, and GSK.