| Management number | 220491187 | Release Date | 2026/05/03 | List Price | $3.40 | Model Number | 220491187 | ||
|---|---|---|---|---|---|---|---|---|---|
| Category | |||||||||
Today, Network Infiltration: Pen-Testing Internal Networks & Active Directory is released—a practical, defense-oriented roadmap to understanding and assessing Windows enterprise networks. Rather than offering tool lists, the book teaches practitioners to think like assessors: define scope, gather the right telemetry, map behaviors to MITRE ATT&CK, and communicate findings leaders can act on.What’s insideThe book demystifies how authentication and authorization actually work in practice—Kerberos, NTLM, tokens, SIDs, SPNs—and shows how Group Policy, delegations, and trust topology shape exposure. Readers build a small, offline lab to observe identity flows on the wire and in logs, deploy Sysmon alongside Windows Event IDs, and integrate signal into SIEM/EDR/UEBA pipelines. The result is a repeatable way to establish baselines, detect what matters, and harden what counts.Who it servesSecurity engineers, detection analysts, incident responders, red/purple teamers, architects, admins—anyone responsible for the safety and reliability of Windows environments.Key takeawaysClear mental models for AD, GPOs, trusts, and admin protocolsA safe, reproducible offline lab and build scriptsCurated Windows Event and Sysmon IDs that surface meaningful behaviorsPractical hardening: tiering, LAPS hygiene, Credential Guard, auditing that worksReporting patterns that tie technical signal to business risk Chapter 0 — Foundations & AcronymsChapter 1 — Assessment Mindset & MethodologyChapter 2 — Building the Safe LabChapter 3 — Identity 101 in Windows DomainsChapter 4 — Kerberos in the Real WorldChapter 5 — NTLM and Legacy RealitiesChapter 6 — Directory Objects, Delegations & RBACChapter 7 — Group Policy Deep DiveChapter 8 — Trusts, Forests, and BoundariesChapter 9 — Name Resolution & Identity DiscoveryChapter 10 — Admin Protocols I: SMB, RPC/DCOMChapter 11 — Admin Protocols II: WMI & WinRMChapter 12 — Remote Access: RDP & NLAChapter 13 — Secrets & Protections: LSASS, LSA, SSOChapter 14 — Telemetry ArchitectureChapter 15 — SIEM/EDR/UEBA IntegrationChapter 16 — Behaviors that Matter (MITRE ATT&CK)Chapter 17 — Hardening the EnterpriseChapter 18 — Designing for ResilienceChapter 19 — Executive Reporting & Risk CommunicationChapter 20 — Putting It All TogetherAppendicesA. Checklists & Templates (Scope, ROE, Evidence Logs)B. Event ID & Sysmon Quick ReferenceC. Lab Topologies & Build Scripts (Safe, Offline) Read more
| XRay | Not Enabled |
|---|---|
| Language | English |
| File size | 2.5 MB |
| Page Flip | Enabled |
| Word Wise | Not Enabled |
| Book 3 of 3 | The Ultimate Black Hat Hackers Handbook : The Series |
| Print length | 270 pages |
| Accessibility | Learn more |
| Publication date | September 7, 2025 |
| Enhanced typesetting | Enabled |
If you notice any omissions or errors in the product information on this page, please use the correction request form below.
Correction Request Form