Kindle Price: $9.99

Save $10.01 (50%)

Read this title for free. Learn more
Read for Free
with Kindle Unlimited
OR

These promotions will be applied to this item:

Some promotions may be combined; others are not eligible to be combined with other offers. For details, please see the Terms & Conditions associated with these promotions.

Deliver to your Kindle or other device

Deliver to your Kindle or other device

Flip to back Flip to front
Audible Narration Playing... Paused   You are listening to a sample of the Audible narration for this Kindle book.
Learn more

Offensive Countermeasures: The Art of Active Defense Kindle Edition

4.4 out of 5 stars 33 customer reviews

See all 3 formats and editions Hide other formats and editions
Price
New from Used from
Kindle
"Please retry"
$9.99

Length: 239 pages Enhanced Typesetting: Enabled

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your email address or mobile phone number.


Editorial Reviews

About the Author

John Strand is a member of PaulDotCom Security Weekly, Owner of Black Hills Information Security and a instructor with the SANS Institute. Paul Asadoorian is the founder of PaulDotCom Security Weekly.

Product Details

  • File Size: 5736 KB
  • Print Length: 239 pages
  • Publisher: PaulDotCom; 1 edition (June 10, 2013)
  • Publication Date: June 10, 2013
  • Sold by: Amazon Digital Services LLC
  • Language: English
  • ASIN: B00DQSQ7QY
  • Text-to-Speech: Enabled
  • X-Ray:
  • Word Wise: Not Enabled
  • Lending: Enabled
  • Enhanced Typesetting: Enabled
  • Amazon Best Sellers Rank: #109,837 Paid in Kindle Store (See Top 100 Paid in Kindle Store)
  •  Would you like to give feedback on images or tell us about a lower price?


More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

Top Customer Reviews

Format: Kindle Edition Verified Purchase
Nice to read but I think it fell short on the technical side. It would have been a lot better if it included more how materials or technical references so we could use it to bulid proof of concept projects.
Comment 5 of 5 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Kindle Edition Verified Purchase
The book expands upon the tools and concepts utilized in the active defense suite. I purchased the book, because I appreciate the work they have put into that suite. That being said, I feel the book leaves a lot to be desired. The whole book seems rushed. Typos and errors abound. I was also expecting a little more depth into legality. For those new to the idea of actively defending networks or security in general, this is still a good read. For those with a little more experience, just view the Derbycon talk and download AD.
Comment 3 of 3 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Kindle Edition Verified Purchase
Overall this book provides a good review of high level concepts with some minor depth of what organizations can do to better protect their assets using both defensive and offensive strategies. I was just hoping for a more technical explanation, and more advanced techniques, but the book does cover what it states. I really hope that there will be a continuation of discussions and more information released regarding this topic and the future of where cyber security / warfare will bring us
Comment 2 of 2 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
As the book states: get your house in order first, and then go out and play.

I read this book today, and poked most of the modules in the ADHD CD.

This book tries to break the mold that hacking back is never okay.
What I found most interesting is the emphasis on NOT hacking the hackers. At least not now.

The emphasis is on obfuscation and data collection before (or if) taking any active action.

This book is not heavy on technical details - nor should it be.
It's trying to convey a new concept.

If you want to hack someone - there are plenty of technical resources on how to hack something. This book offers some ideas on an interesting and new line of thought.
Comment 1 of 1 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Kindle Edition Verified Purchase
Those who overlook countermeasures as an integral component of security will surely fail in their roles as protectors. OCM is an excellent overview of the topic and a better than entry level introduction.

I remember coding countermeasures in the early days designed specifically to take compromised systems promiscuously engaged in the act of attacking other systems off-line and display a helpful boot screen for the target systems' administrators. We were never destructive or vindictive and always treated such responses unapologetically as self-defense; because that is exactly what it was.

Law enforcement does not protect, moves at glacial speeds, and will generally defer from action unless a successful prosecution is assured (or the pubic noise level demands it). (Don't misunderstand me, I have the highest respect for first responders.) It is therefore incumbent for those of us with the skills to responsibly protect our infrastructure using measured responses consistent with threat level.

OCM does exactly what it intends by succinctly covering the important elements of this neglected topic and furthers a much needed discussion. Highly recommended.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
Having attended many webcasts of John Stand and Paul Asadorian, I have come to appreciate them both as excellent security practitioners and the fact they are more than willing to share their knowledge. This book is a compilation of many of their webcasts/teachings and it explains the idea of active defense and also touches on ADHD (Active Defense Harbinger Distribution); ADHD is meant to help tilt the scales of security back into the hands of the defenders and/or at least give them a more level playing field. I originally purchased this book simply to support them and their knowledge crusade, however, I read the book and then went back through it to try all of their theories against my own techniques and I have to say they work extremely well. Absolutely essential for anyone looking for the next step beyond OS patching, updated anti-virus, IDS/IPS, etc. -- DH
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
This is a great read for someone that has already spent some time doing Information Security on either the offensive or defensive side. It presents some creative ways to perform annoyance, attribution, and, ultimately, attack the attackers. Since this is quite different from the traditional and accepted approaches to InfoSec, I look forward to seeing how the industry responds to the ideas that are presented.

The book is self-published...there are some typos, minor grammatical problems, etc. But the content is very good.

This book should be one of many resources that you use to grow your knowledge and abilities.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Kindle Edition Verified Purchase
This book is well written and the intent of what the Author/s are trying to convey is easily understood. I was impressed by how the book addresses misconceptions regarding techniques that can be used to defend our networks. Each tool presented in the book is presented in a way that is easy to understand while also giving the reader the knowledge of appropriate use cases.

I've enjoyed attending John's SANS courses as well as his insights on the pauldtocom podcast, he is very knowledgeable and an excellent resource to learn from. Nice work.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Most Recent Customer Reviews


Forums

There are no discussions about this product yet.
Be the first to discuss this product with the community.
Start a new discussion
Topic:
First post:
Prompts for sign-in