Dekorationsartikel gehören nicht zum Leistungsumfang.
Sprache:
Englisch
56,70 €
Versandkostenfrei per Post / DHL
auf Lager, Lieferzeit 1-2 Werktage
Kategorien:
Beschreibung
Stop Relying on Black Box Tools and Start Building Your Own.
Offensive security isn’t just about running scripts; it’s about implementing engineering solutions. Red Team Engineering will show you how to transition from penetration tester to red team operator—taking you beyond the basics of exploitation to teach you the “how” of professional offensive development and infrastructure engineering.
Casey Erdmann, an experienced red team operator, guides you through the complete development life cycle of a modern cyber operation. Using a project-based approach, you’ll engineer a complete offensive arsenal as you:
You'll also learn how to:
Whether your goal is to understand the enemy or to level up your penetration testing skills, Red Team Engineering will show you how to build professional-grade hacking tools that get the job done.
Offensive security isn’t just about running scripts; it’s about implementing engineering solutions. Red Team Engineering will show you how to transition from penetration tester to red team operator—taking you beyond the basics of exploitation to teach you the “how” of professional offensive development and infrastructure engineering.
Casey Erdmann, an experienced red team operator, guides you through the complete development life cycle of a modern cyber operation. Using a project-based approach, you’ll engineer a complete offensive arsenal as you:
- Build full-stack credential harvesting apps with HTML, JavaScript, PHP, and MySQL.
- Create brute-force and password-spraying tools in Python to attack SMB services.
- Use Go to craft custom ransomware with encryption/decryption logic.
- Abandon manual server setups for reproducible, disposable infrastructure.
- Deploy C2 servers, redirectors, and phishing infrastructure on AWS.
You'll also learn how to:
- Tunnel through firewalls with reverse VPNs using OpenVPN and PiVPN.
- Manage fleet configurations at scale with Salt Project.
- Simulate execution of end-to-end scenarios like deploying a physical “dropbox.”
Whether your goal is to understand the enemy or to level up your penetration testing skills, Red Team Engineering will show you how to build professional-grade hacking tools that get the job done.
Stop Relying on Black Box Tools and Start Building Your Own.
Offensive security isn’t just about running scripts; it’s about implementing engineering solutions. Red Team Engineering will show you how to transition from penetration tester to red team operator—taking you beyond the basics of exploitation to teach you the “how” of professional offensive development and infrastructure engineering.
Casey Erdmann, an experienced red team operator, guides you through the complete development life cycle of a modern cyber operation. Using a project-based approach, you’ll engineer a complete offensive arsenal as you:
You'll also learn how to:
Whether your goal is to understand the enemy or to level up your penetration testing skills, Red Team Engineering will show you how to build professional-grade hacking tools that get the job done.
Offensive security isn’t just about running scripts; it’s about implementing engineering solutions. Red Team Engineering will show you how to transition from penetration tester to red team operator—taking you beyond the basics of exploitation to teach you the “how” of professional offensive development and infrastructure engineering.
Casey Erdmann, an experienced red team operator, guides you through the complete development life cycle of a modern cyber operation. Using a project-based approach, you’ll engineer a complete offensive arsenal as you:
- Build full-stack credential harvesting apps with HTML, JavaScript, PHP, and MySQL.
- Create brute-force and password-spraying tools in Python to attack SMB services.
- Use Go to craft custom ransomware with encryption/decryption logic.
- Abandon manual server setups for reproducible, disposable infrastructure.
- Deploy C2 servers, redirectors, and phishing infrastructure on AWS.
You'll also learn how to:
- Tunnel through firewalls with reverse VPNs using OpenVPN and PiVPN.
- Manage fleet configurations at scale with Salt Project.
- Simulate execution of end-to-end scenarios like deploying a physical “dropbox.”
Whether your goal is to understand the enemy or to level up your penetration testing skills, Red Team Engineering will show you how to build professional-grade hacking tools that get the job done.
Über den Autor
Casey Erdmann specializes in custom tool development and post-exploitation. A “hacker’s hacker,” he focuses on finding creative ways to make systems work in unintended ways. Erdmann is the founder of Injection Software and Security, LLC, and the creator of popular online courses as well as tools and exploits used by teams all over the world.
Inhaltsverzeichnis
Contents
PART I: OFFENSIVE SECURITY DEVELOPMENT
Chapter 1: Web Application Exploits
Chapter 2: Authentication Attacks
Chapter 3: Custom Malware Development and Distribution
PART II: OFFENSIVE SECURITY ENGINEERING
Chapter 4: Automating Offensive Security Infrastructure Deployment
Chapter 5: Applying Network Fundamentals to C2 Implementation
Chapter 6: Reverse VPN Tunneling
Chapter 7: Managing Infrastructure for Offensive Security Operations
PART III: OFFENSIVE SECURITY IN THE REAL WORLD
Chapter 8: Exploitation with Metasploit
Chapter 9: Deploying a Dropbox
Chapter 10: Phishing Attack with C2 Redirectors
Chapter 11: Multiplayer C2 Configuration
Resources
Index
PART I: OFFENSIVE SECURITY DEVELOPMENT
Chapter 1: Web Application Exploits
Chapter 2: Authentication Attacks
Chapter 3: Custom Malware Development and Distribution
PART II: OFFENSIVE SECURITY ENGINEERING
Chapter 4: Automating Offensive Security Infrastructure Deployment
Chapter 5: Applying Network Fundamentals to C2 Implementation
Chapter 6: Reverse VPN Tunneling
Chapter 7: Managing Infrastructure for Offensive Security Operations
PART III: OFFENSIVE SECURITY IN THE REAL WORLD
Chapter 8: Exploitation with Metasploit
Chapter 9: Deploying a Dropbox
Chapter 10: Phishing Attack with C2 Redirectors
Chapter 11: Multiplayer C2 Configuration
Resources
Index
Details
| Erscheinungsjahr: | 2026 |
|---|---|
| Fachbereich: | Datenkommunikation, Netze & Mailboxen |
| Genre: | Importe, Informatik |
| Rubrik: | Naturwissenschaften & Technik |
| Medium: | Taschenbuch |
| Inhalt: | Einband - flex.(Paperback) |
| ISBN-13: | 9781718504264 |
| ISBN-10: | 1718504268 |
| Sprache: | Englisch |
| Einband: | Kartoniert / Broschiert |
| Autor: | Erdmann, Casey |
| Hersteller: |
Random House LLC US
No Starch Press |
| Verantwortliche Person für die EU: | Libri GmbH, Europaallee 1, D-36244 Bad Hersfeld, gpsr@libri.de |
| Maße: | 231 x 178 x 22 mm |
| Von/Mit: | Casey Erdmann |
| Erscheinungsdatum: | 24.03.2026 |
| Gewicht: | 0,652 kg |