Red Team Field Manual


Ben Clark - 2014
    The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell. The RTFM will repeatedly save you time looking up the hard to remember Windows nuances such as Windows wmic and dsquery command line tools, key registry values, scheduled tasks syntax, startup locations and Windows scripting. More importantly, it should teach you some new red team techniques.

Vanished


Fletcher Knebel - 1968
    How could a prominent Washington attorney and top aide to the President of the United States during a contentious re-election campaign simply vanish?

Security Engineering: A Guide to Building Dependable Distributed Systems


Ross J. Anderson - 2008
    Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.

The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler


Chris Eagle - 2008
    With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into something you can actually use.Hailed by the creator of IDA Pro as the "long-awaited" and "information-packed" guide to IDA, The IDA Pro Book covers everything from the very first steps to advanced automation techniques. While other disassemblers slow your analysis with inflexibility, IDA invites you to customize its output for improved readability and usefulness. You'll save time and effort as you learn to:Identify known library routines, so you can focus your analysis on other areas of the code Extend IDA to support new processors and filetypes, making disassembly possible for new or obscure architectures Explore popular plug-ins that make writing IDA scripts easier, allow collaborative reverse engineering, and much more Utilize IDA's built-in debugger to tackle obfuscated code that would defeat a stand-alone disassembler You'll still need serious assembly skills to tackle the toughest executables, but IDA makes things a lot easier. Whether you're analyzing the software on a black box or conducting hard-core vulnerability research, a mastery of IDA Pro is crucial to your success. Take your skills to the next level with The IDA Pro Book.

Money Has No Smell: The Africanization of New York City


Paul Stoller - 2002
    In Money Has No Smell, Paul Stoller offers us a more complete portrait of the complex lives of West African immigrants like Diallo, a portrait based on years of research Stoller conducted on the streets of New York City during the 1990s.Blending fascinating ethnographic description with incisive social analysis, Stoller shows how these savvy West African entrepreneurs have built cohesive and effective multinational trading networks, in part through selling a simulated Africa to African Americans. These and other networks set up by the traders, along with their faith as devout Muslims, help them cope with the formidable state regulations and personal challenges they face in America. As Stoller demonstrates, the stories of these West African traders illustrate and illuminate ongoing debates about globalization, the informal economy, and the changing nature of American communities.

Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.


Don Murdoch - 2014
    The BTHb includes essential information in a condensed handbook format. Main topics include the incident response process, how attackers work, common tools for incident response, a methodology for network analysis, common indicators of compromise, Windows and Linux analysis processes, tcpdump usage examples, Snort IDS usage, packet headers, and numerous other quick reference topics. The book is designed specifically to share "real life experience," so it is peppered with practical techniques from the authors' extensive career in handling incidents. Whether you are writing up your cases notes, analyzing potentially suspicious traffic, or called in to look over a misbehaving server - this book should help you handle the case and teach you some new techniques along the way.

The Spy Whisperer


Matthew Dunn - 2018
    One by one, they are committing suicide. But the suicides are not what they seem. They have been forced to take their lives by a supremely clever individual. Former high-ranking MI6 officer Ben Sign is instructed to identify who is behind the murders. Could it be a hostile foreign intelligence agency? Sign thinks not. He believes the murderer is one of the six MI6 officers who wants to kill off the competition. With the help of a male former undercover police officer and a female serving Special Branch officer, he scours London and the rest of Britain to identify the serial killer he nicknames 'the whisperer'. But the whisperer has help: a former special forces assassin, code name 'the limpet'. Can Sign find the whisperer and the limpet in time? Who's working against him? Can he protect national security from a psychopath?"Fans of action-heavy thrillers set in the intelligence world are likely already reading Dunn, but if they're not, they should start. They won't be disappointed." - Booklist"For those who like an updated version of James Bond, Matthew Dunn's Will Cochrane books are spy stories at their finest." - Iron Mountain Daily NewsPraise for Spycatcher: "Great talent, great imagination, and real been-there done-that authenticity make this one of the year's best thriller debuts. Highly recommended." - Lee Child"I know of no other spy thriller that so successfully blends the fascinating nuances of the business of espionage and intelligence work with full-throttle suspense storytelling." - Jeffery Deaver"Dunn, who was a field officer in the British Secret Intelligence Service, often known as M16, has created a plot with plenty of action and lots of twists and turns . . . nonstop action and relentless danger." - Associated PressPraise for Dark Spies: "Another deep and intense thriller that feels authentic in terms of how it conveys the spy world... Dunn has crafted another winner in this fine series. The world of spy fiction has a writer who deserves comparison to Ludlum and Fleming." - Booklist"Fans will enjoy the trademark momentum and the inclusion of several long-running subplots and characters." - Publishers Weekly on A Soldier's Revenge"One of the things that makes A Soldier's Revenge so good, aside from the complexity of the plot, the harrowing escapes and spy craft that Dunn artfully employs, is the visceral feelings that he can convey. . . . Cochrane is no emotionless Bond...he's much more real." - blackdogspeaks.com on A Soldier's Revenge

Who'd be a copper?: Thirty years a frontline British cop


Jonathan Nicholas - 2015
     Who’d be a copper? follows Jonathan Nicholas in his transition from a long-haired world traveller to becoming one of ‘Thatcher’s army’ on the picket lines of the 1984 miner’s dispute and beyond. His first years in the police were often chaotic and difficult, and he was very nearly sacked for not prosecuting enough people. Working at the sharp end of inner-city policing for the entire thirty years, Jonathan saw how politics interfered with the job; from the massaging of crime figures to personal petty squabbles with senior officers. His last ten years were the oddest, from being the best cop in the force to repeatedly being told that he faced dismissal. This astonishing true story comes from deep in the heart of British inner-city policing and is a revealing insight into what life is really like for a police officer, amid increasing budget cuts, bizarre Home Office ideas and stifling political correctness. “I can write what I like, even if it brings the police service into disrepute, because I don’t work for them anymore!” says Jonathan Nicholas. Who’d be a copper? is a unique insight into modern policing that will appeal to fans of autobiographies, plus those interested in seeing what really happens behind the scenes of the UK police."I HAVE BOUGHT YOUR BOOK."  TW,  Sir Thomas Winsor, WS HMCIC"A WEALTH OF ANECDOTES. FASCINATING." John Donoghue, author of 'Police, Crime & 999'"AN ILLUMINATING ACCOUNT OF LIFE AS A FRONT LINE OFFICER IN BRITAIN'S POLICE, A SERVICE OFTEN STRETCHED FOR RESOURCES BUT MIRED IN RED TAPE AND POLITICAL CORRECTNESS."  Pat Condell, author of 'Freedom is My Religion'

Underground: Tales of Hacking, Madness, and Obsession on the Electronic Frontier


Suelette Dreyfus - 1997
    Spanning three continents and a decade of high level infiltration, they created chaos amongst some of the world's biggest and most powerful organisations, including NASA and the US military. Brilliant and obsessed, many of them found themselves addicted to hacking and phreaking. Some descended into drugs and madness, others ended up in jail.As riveting as the finest detective novel and meticulously researched, Underground follows the hackers through their crimes, their betrayals, the hunt, raids and investigations. It is a gripping tale of the digital underground.

Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning


Gordon Fyodor Lyon - 2009
    From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. Examples and diagrams show actual communication on the wire. Topics include subverting firewalls and intrusion detection systems, optimizing Nmap performance, and automating common networking tasks with the Nmap Scripting Engine. Hints and instructions are provided for common uses such as taking network inventory, penetration testing, detecting rogue wireless access points, and quashing network worm outbreaks. Nmap runs on Windows, Linux, and Mac OS X.Nmap's original author, Gordon "Fyodor" Lyon, wrote this book to share everything he has learned about network scanning during more than 11 years of Nmap development. Visit http: //nmap.org/book for more information and sample chapters.

Cryptography Engineering: Design Principles and Practical Applications


Niels Ferguson - 2010
    Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field.After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography.An author team of internationally recognized cryptography experts updates you on vital topics in the field of cryptography Shows you how to build cryptography into products from the start Examines updates and changes to cryptography Includes coverage on key servers, message security, authentication codes, new standards, block ciphers, message authentication codes, and more Cryptography Engineering gets you up to speed in the ever-evolving field of cryptography.

An Execution in the Family: One Son's Journey


Robert Meeropol - 2003
    It is the story of how he tried to balance a strong desire to live a normal life and raise a family, with a growing need to create something useful out of his nightmare childhood. It is also a poignant account of how, at age forty-three, he finally found a way to honor his parents and also be true to himself.

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy


Patrick Engebretson - 2011
    No prior hacking experience is needed. You learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, Hacker Defender rootkit, and more. A simple and clean explanation of how to effectively utilize these tools as well as the introduction to a four-step methodology for conducting a penetration test or hack, will provide you with know-how required to jump start your career or gain a better understanding of offensive security. The book serves as an introduction to penetration testing and hacking and will provide you with a solid foundation of knowledge. After completing the book readers will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks through each of the steps and tools in a structured, orderly manner allowing readers to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process allows readers to clearly see how the tools and phases relate.Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phasesWritten by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State UniversityUtilizes the Backtrack Linux distribution and focuses on the seminal tools required to complete a penetration test

Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare


Paul Rosenzweig - 2013
    Telecommunications, commercial and financial systems, government operations, food production - virtually every aspect of global civilization now depends on interconnected cyber systems to operate; systems that have helped advance medicine, streamline everyday commerce, and so much more. Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare is your guide to understanding the intricate nature of this pressing subject. Delivered by cybersecurity expert and professor Paul Rosenzweig, these 18 engaging lectures will open your eyes to the structure of the Internet, the unique dangers it breeds, and the ways we’re learning how to understand, manage, and reduce these dangers.In addition, Professor Rosenzweig offers sensible tips on how best to protect yourself, your network, or your business from attack or data loss.Disclaimer: The views expressed in this course are those of the professor and do not necessarily reflect the position or policy of the U.S. Department of Homeland Security, the U.S. Department of Defense, or the U.S. government. Disclaimer: Please note that this recording may include references to supplemental texts or print references that are not essential to the program and not supplied with your purchase.©2013 The Teaching Company, LLC (P)2013 The Great Courses

The Shellcoder's Handbook: Discovering and Exploiting Security Holes


Jack Koziol - 2004
    This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and VistaAlso features the first-ever published information on exploiting Cisco's IOS, with content that has never before been exploredThe companion Web site features downloadable code files