Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Red Team Engineering - Casey Erdmann

Red Team Engineering

The Art of Building Offensive Tools and Infrastructure

(Autor)

Buch | Softcover
336 Seiten
2026
No Starch Press,US (Verlag)
978-1-7185-0426-4 (ISBN)
CHF 125,65 inkl. MwSt
  • Noch nicht erschienen (ca. März 2026)
  • Versandkostenfrei
  • Auch auf Rechnung
  • Artikel merken
Based on the author's popular online course, Offensive Security turns offensive security theory into practice, equipping security professionals with the hands-on knowledge they'll need to carry out red team operations in the field. Unlike other offensive security books, this title explains the 'how' of red team operations, embracing the hacker spirit by teaching techniques and practices often kept under wraps in the industry. Erdmann also covers tooling and infrastructure, two key components of red team operations; comparable resources tend to focus on one or the other and lack specifics on implementation. The book begins by covering how to write custom tools then teaches readers how to engineer the infrastructure to effectively use those tools. Projects and screenshots throughout help reinforce learning, and the conversational tone is approachable and engaging. Erdmann emphasizes that readers can apply the skills they acquire here across numerous IT areas, as the technologies and procedures covered are applicable to defensive security or even neutral IT roles.

Casey Erdmann has worked in the field of information technology for more than a decade and has made it his mission to share his hacking mindset with others through online courses as well as countless tools and exploits used by teams all over the world. His primary skills are in offensive security, but Erdmann specializes in custom tool development and post-exploitation techniques, services he offers through his security consulting company, Injection Software and Security, LLC.

Introduction

PART I: OFFENSIVE SECURITY DEVELOPMENT
Chapter 1: Web Applications Exploits
Chapter 2: Authentication Attacks
Chapter 3: Malware Design and Distribution

PART II: OFFENSIVE SECURITY ENGINEERING
Chapter 4: Configuring OffSec Infrastructure with IaC Tools
Chapter 5: Applying Network Fundamentals to C2 Implementation
Chapter 6: Reverse VPN Tunneling
Chapter 7: Managing Infrastructure for OffSec Operations

PART III: OFFENSIVE SECURITY IN THE REAL WORLD
Chapter 8: A Red Teaming Deep Dive
Chapter 9: Scenario 1: Classic Exploitation
Chapter 10: Scenario 2: The DropBox
Chapter 11: Scenario 3: A Phishing Attack with C2 Redirectors
Chapter 12: Multiplayer C2 Configuration

Erscheint lt. Verlag 17.3.2026
Verlagsort San Francisco
Sprache englisch
Maße 177 x 234 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
ISBN-10 1-7185-0426-8 / 1718504268
ISBN-13 978-1-7185-0426-4 / 9781718504264
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 53,15
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95