Start reading Offensive Countermeasures: The Art of Active Defense on the free Kindle Reading App or on your Kindle in under a minute. Don't have a Kindle? Get your Kindle here.
OR
Read for Free
with Kindle Unlimited

Deliver to your Kindle or other device

Enter a promotion code
or gift card
 
 
 

Try it free

Sample the beginning of this book for free

Deliver to your Kindle or other device

Sorry, this item is not available in
Image not available for
Color:
Image not available
 

Offensive Countermeasures: The Art of Active Defense [Kindle Edition]

John Strand , Paul Asadoorian , Ethan Robish , Benjamin Donnelly
4.3 out of 5 stars  See all reviews (30 customer reviews)

Print List Price: $20.00
Kindle Price: $9.99
You Save: $10.01 (50%)
 
Kindle Unlimited Read this title for free and get unlimited access to over 700,000 titles. Learn More

Free Kindle Reading App Anybody can read Kindle books—even without a Kindle device—with the FREE Kindle app for smartphones, tablets and computers.

To get the free app, enter your email address or mobile phone number.

Formats

Amazon Price New from Used from
Kindle Edition $9.99  
Paperback $17.73  
Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Book Description

Tired of playing catchup with hackers? Does it ever seem they have all of the cool tools? Does it seem like defending a network is just not fun?

This books introduces new cyber-security defensive tactics to annoy attackers, gain attribution and insight on who and where they are. It discusses how to attack attackers in a way which is legal and incredibly useful.


Editorial Reviews

About the Author

John Strand is a member of PaulDotCom Security Weekly, Owner of Black Hills Information Security and a instructor with the SANS Institute. Paul Asadoorian is the founder of PaulDotCom Security Weekly.

Product Details

  • File Size: 5678 KB
  • Print Length: 239 pages
  • Page Numbers Source ISBN: 1490945067
  • Publisher: PaulDotCom; 1 edition (June 10, 2013)
  • Sold by: Amazon Digital Services, Inc.
  • Language: English
  • ASIN: B00DQSQ7QY
  • Text-to-Speech: Enabled
  • X-Ray:
  • Word Wise: Not Enabled
  • Lending: Enabled
  • Amazon Best Sellers Rank: #260,584 Paid in Kindle Store (See Top 100 Paid in Kindle Store)
  •  Would you like to give feedback on images?


Customer Reviews

Most Helpful Customer Reviews
4 of 4 people found the following review helpful
3.0 out of 5 stars Nice reference but ... August 18, 2013
Format:Kindle Edition|Verified Purchase
Nice to read but I think it fell short on the technical side. It would have been a lot better if it included more how materials or technical references so we could use it to bulid proof of concept projects.
Comment | 
Was this review helpful to you?
3 of 3 people found the following review helpful
3.0 out of 5 stars Decent read though very brief October 8, 2013
By Anon
Format:Kindle Edition|Verified Purchase
The book expands upon the tools and concepts utilized in the active defense suite. I purchased the book, because I appreciate the work they have put into that suite. That being said, I feel the book leaves a lot to be desired. The whole book seems rushed. Typos and errors abound. I was also expecting a little more depth into legality. For those new to the idea of actively defending networks or security in general, this is still a good read. For those with a little more experience, just view the Derbycon talk and download AD.
Comment | 
Was this review helpful to you?
2 of 2 people found the following review helpful
4.0 out of 5 stars Pretty good overview of Offensive strategies September 29, 2013
Format:Kindle Edition|Verified Purchase
Overall this book provides a good review of high level concepts with some minor depth of what organizations can do to better protect their assets using both defensive and offensive strategies. I was just hoping for a more technical explanation, and more advanced techniques, but the book does cover what it states. I really hope that there will be a continuation of discussions and more information released regarding this topic and the future of where cyber security / warfare will bring us
Comment | 
Was this review helpful to you?
5.0 out of 5 stars Great read! December 18, 2013
Format:Paperback|Verified Purchase
Having attended many webcasts of John Stand and Paul Asadorian, I have come to appreciate them both as excellent security practitioners and the fact they are more than willing to share their knowledge. This book is a compilation of many of their webcasts/teachings and it explains the idea of active defense and also touches on ADHD (Active Defense Harbinger Distribution); ADHD is meant to help tilt the scales of security back into the hands of the defenders and/or at least give them a more level playing field. I originally purchased this book simply to support them and their knowledge crusade, however, I read the book and then went back through it to try all of their theories against my own techniques and I have to say they work extremely well. Absolutely essential for anyone looking for the next step beyond OS patching, updated anti-virus, IDS/IPS, etc. -- DH
Comment | 
Was this review helpful to you?
4.0 out of 5 stars Great Intro! August 23, 2013
By Skymeat
Format:Paperback|Verified Purchase
As the book states: get your house in order first, and then go out and play.

I read this book today, and poked most of the modules in the ADHD CD.

This book tries to break the mold that hacking back is never okay.
What I found most interesting is the emphasis on NOT hacking the hackers. At least not now.

The emphasis is on obfuscation and data collection before (or if) taking any active action.

This book is not heavy on technical details - nor should it be.
It's trying to convey a new concept.

If you want to hack someone - there are plenty of technical resources on how to hack something. This book offers some ideas on an interesting and new line of thought.
Comment | 
Was this review helpful to you?
Format:Paperback
This is a great read for someone that has already spent some time doing Information Security on either the offensive or defensive side. It presents some creative ways to perform annoyance, attribution, and, ultimately, attack the attackers. Since this is quite different from the traditional and accepted approaches to InfoSec, I look forward to seeing how the industry responds to the ideas that are presented.

The book is self-published...there are some typos, minor grammatical problems, etc. But the content is very good.

This book should be one of many resources that you use to grow your knowledge and abilities.
Comment | 
Was this review helpful to you?
4.0 out of 5 stars Good for what it is. March 12, 2014
Format:Paperback|Verified Purchase
This book is good for what it is. It is not an academic InfoSec book.

The book is ontended to give some hands on tools for active cyber defense. If you are looking for a deep explanation of how the variuos tools work then look elsewhere. If you want a quick and dirty set of tools that help you set up an active defense environment then this is the book.
Comment | 
Was this review helpful to you?
3.0 out of 5 stars Good ideas January 31, 2014
Format:Kindle Edition|Verified Purchase
Really good ideas in this book that are with expanding on in enterprises. My only.complaint is the proofreading, the number of typos is annoying.
Comment | 
Was this review helpful to you?
Most Recent Customer Reviews
5.0 out of 5 stars Five Stars
Good philosophy and advice.
Published 2 months ago by reecie bankston
1.0 out of 5 stars Collection of man pages with screenshots
This book is a collection of man pages and screenshots. Paul could have easily published three blog posts on his site with a few links and we all could have saved some trees. Read more
Published 3 months ago by Christian
5.0 out of 5 stars Defend your network, use available tools, learn which tools are...
Great collection of offensive tools - and summary of their capabilities. Now it is up to you to seek them out, learn how to use them and - defend yourself! Read more
Published 4 months ago by Linda G Lesselyoung
5.0 out of 5 stars Great Content
This is a great book to have at the ready for when you need it. John & Paul really know their stuff. Terrific resource, highly recommended.
Published 11 months ago by desktopyou
4.0 out of 5 stars Well put info
Well put information, font size could use some work. Overall GREAT material with cativatig and well put follow-along demonstrations. Good purchase
Published 12 months ago by Lloyd
5.0 out of 5 stars New set of projects for me
great book and a great idea. There is no reason defense has to be passive and wait. This gives me a great list of projects to start with in the new year.
Published 13 months ago by Matt
5.0 out of 5 stars Honey What?
A great book by the folks at Black Hills Info Sec. John succinctly explains tactics to provide countermeasures against common attacks. Highly recommended. Read more
Published 14 months ago by Bill Knight
5.0 out of 5 stars Easy read for a technical book
Certainly has all the geek parts but still readable for less technical (managerial?) readers. I have really enjoyed it and I'm sure you will as well.
Published 14 months ago by Scott D. Smith
Search Customer Reviews
Search these reviews only

More About the Author

Discover books, learn about writers, read author blogs, and more.


Forums

There are no discussions about this product yet.
Be the first to discuss this product with the community.
Start a new discussion
Topic:
First post:
Prompts for sign-in
 


Look for Similar Items by Category