New Arrivals/Restock

Network Infiltration: Pen-Testing Internal Networks & Active Directory: End-to-End Field Manual to Understand how Windows Domains, Active Directory, and ... Black Hat Hackers Handbook : The Series 3) Kindle Edition

flash sale iconLimited Time Sale
Until the end
20
11
39

US$5.10 cheaper than the new price!!

Free shipping for purchases over $99 ( Details )
Free cash-on-delivery fees for purchases over $99
Please note that the sales price and tax displayed may differ between online and in-store. Also, the product may be out of stock in-store.
Used  US$3.40
quantity

Product details

Management number 220491187 Release Date 2026/05/03 List Price US$3.40 Model Number 220491187
Category

Today, Network Infiltration: Pen-Testing Internal Networks & Active Directory is released—a practical, defense-oriented roadmap to understanding and assessing Windows enterprise networks. Rather than offering tool lists, the book teaches practitioners to think like assessors: define scope, gather the right telemetry, map behaviors to MITRE ATT&CK, and communicate findings leaders can act on.What’s insideThe book demystifies how authentication and authorization actually work in practice—Kerberos, NTLM, tokens, SIDs, SPNs—and shows how Group Policy, delegations, and trust topology shape exposure. Readers build a small, offline lab to observe identity flows on the wire and in logs, deploy Sysmon alongside Windows Event IDs, and integrate signal into SIEM/EDR/UEBA pipelines. The result is a repeatable way to establish baselines, detect what matters, and harden what counts.Who it servesSecurity engineers, detection analysts, incident responders, red/purple teamers, architects, admins—anyone responsible for the safety and reliability of Windows environments.Key takeawaysClear mental models for AD, GPOs, trusts, and admin protocolsA safe, reproducible offline lab and build scriptsCurated Windows Event and Sysmon IDs that surface meaningful behaviorsPractical hardening: tiering, LAPS hygiene, Credential Guard, auditing that worksReporting patterns that tie technical signal to business risk Chapter 0 — Foundations & AcronymsChapter 1 — Assessment Mindset & MethodologyChapter 2 — Building the Safe LabChapter 3 — Identity 101 in Windows DomainsChapter 4 — Kerberos in the Real WorldChapter 5 — NTLM and Legacy RealitiesChapter 6 — Directory Objects, Delegations & RBACChapter 7 — Group Policy Deep DiveChapter 8 — Trusts, Forests, and BoundariesChapter 9 — Name Resolution & Identity DiscoveryChapter 10 — Admin Protocols I: SMB, RPC/DCOMChapter 11 — Admin Protocols II: WMI & WinRMChapter 12 — Remote Access: RDP & NLAChapter 13 — Secrets & Protections: LSASS, LSA, SSOChapter 14 — Telemetry ArchitectureChapter 15 — SIEM/EDR/UEBA IntegrationChapter 16 — Behaviors that Matter (MITRE ATT&CK)Chapter 17 — Hardening the EnterpriseChapter 18 — Designing for ResilienceChapter 19 — Executive Reporting & Risk CommunicationChapter 20 — Putting It All TogetherAppendicesA. Checklists & Templates (Scope, ROE, Evidence Logs)B. Event ID & Sysmon Quick ReferenceC. Lab Topologies & Build Scripts (Safe, Offline) Read more

XRay Not Enabled
Language English
File size 2.5 MB
Page Flip Enabled
Word Wise Not Enabled
Book 3 of 3 The Ultimate Black Hat Hackers Handbook : The Series
Print length 270 pages
Accessibility Learn more
Publication date September 7, 2025
Enhanced typesetting Enabled

Correction of product information

If you notice any omissions or errors in the product information on this page, please use the correction request form below.

Correction Request Form

Product Review

You must be logged in to post a review