Shop Wicked Virtual Showroom
Add Prime to get Fast, Free delivery
Amazon prime logo
$21.25
Get Fast, Free Shipping with Amazon Prime FREE Returns
FREE delivery Saturday, January 11 on orders shipped by Amazon over $35
Or Prime members get FREE delivery Thursday, January 9. Order within 19 mins.
In Stock
$$21.25 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$21.25
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Ships from
Amazon.com
Amazon.com
Ships from
Amazon.com
Sold by
Amazon.com
Amazon.com
Sold by
Amazon.com
Returns
30-day refund/replacement
30-day refund/replacement
This item can be returned in its original condition for a full refund or replacement within 30 days of receipt.
Payment
Secure transaction
Your transaction is secure
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the author

Something went wrong. Please try your request again later.

Offensive Countermeasures Paperback – August 21, 2017

4.4 4.4 out of 5 stars 159 ratings

{"desktop_buybox_group_1":[{"displayPrice":"$21.25","priceAmount":21.25,"currencySymbol":"$","integerValue":"21","decimalSeparator":".","fractionalValue":"25","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"7DLgJyhf8ON8P%2B2O8qtvTKZL6JNX0poFmpvTBJ1YpKN6td3%2FksR8EHcGunQY5%2Fx6goF03tBFW2r3RJiNIC6BzxNYdjq1BqExV%2Fo5vJD36DY95wEKyI74YJBPzoqFHHuEn0CJozOCK3eQ1t7Sp7EjoQ%3D%3D","locale":"en-US","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}]}

Purchase options and add-ons

This book introduces cyber-security defensive tactics to annoy attackers, gain attribution and insight on who and where they are. It discusses how to attack attackers in a way which is legal and incredibly useful. It is time to start looking beyond traditional IDS/IPS/AV technologies. It is time for defensive tactics to get a bit offensive.
The%20Amazon%20Book%20Review
The Amazon Book Review
Book recommendations, author interviews, editors' picks, and more. Read it now.

Frequently bought together

This item: Offensive Countermeasures
$21.25
Get it as soon as Saturday, Jan 11
In Stock
Ships from and sold by Amazon.com.
+
$24.00
Get it as soon as Saturday, Jan 11
In Stock
Ships from and sold by Amazon.com.
+
$25.14
Get it as soon as Saturday, Jan 11
In Stock
Ships from and sold by Amazon.com.
Total price: $00
To see our price, add these items to your cart.
Details
Added to Cart
spCSRF_Treatment
Choose items to buy together.

Product details

  • Publisher ‏ : ‎ CreateSpace Independent Publishing Platform (August 21, 2017)
  • Language ‏ : ‎ English
  • Paperback ‏ : ‎ 170 pages
  • ISBN-10 ‏ : ‎ 1974671690
  • ISBN-13 ‏ : ‎ 978-1974671694
  • Item Weight ‏ : ‎ 1 pounds
  • Dimensions ‏ : ‎ 6 x 0.4 x 9 inches
  • Customer Reviews:
    4.4 4.4 out of 5 stars 159 ratings

About the author

Follow authors to get new release updates, plus improved recommendations.
Ethan Robish
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Discover more of the author’s books, see similar authors, read book recommendations and more.

Customer reviews

4.4 out of 5 stars
159 global ratings

Review this product

Share your thoughts with other customers

Customers say

Customers find the book provides an excellent overview of the topic with a good review of high-level concepts. They find it well-written and a nice reference. Readers appreciate the new perspective on defensive security and hands-on active defense techniques.

AI-generated from the text of customer reviews

30 customers mention "Knowledge level"28 positive2 negative

Customers find this book provides a good overview of the topic. They appreciate the well-presented information and new inspiration it provides. The book provides a good review of high-level concepts with some minor depth. It gives them lots of knowledge and new inspiration, and is a nice reference for tools and techniques that are worth trying. The tactics and countermeasures provided against common attacks are explained succinctly and in detail, making it easy to replicate concepts.

"...OCM is an excellent overview of the topic and a better than entry level introduction...." Read more

"...These techniques are very useful...." Read more

"...To the minimum, the list of tools and techniques are a great read and worth a try in a controlled environment to say the least." Read more

"This book is great for anyone in IT or cybersecurity. It is so detailed that it makes it easy to replicate concepts in the book." Read more

23 customers mention "Readability"20 positive3 negative

Customers find the book well-written and easy to understand. They appreciate the fresh strategies and practical examples using modern tools. Many readers find it better than most information security books, making it accessible for less technical readers.

"...The book is also well written, much better than most information security books." Read more

"...There are some fresh strategies that are worth reviewing and discussion of their merits." Read more

"This book is good for what it is. It is not an academic InfoSec book...." Read more

"...Great read overall, and I would highly recommend this for anyone in the information security field." Read more

14 customers mention "Defense value"14 positive0 negative

Customers find the book provides a new perspective on defensive security and countermeasures. They say it's a great way to get into the field of active defense, with hands-on techniques. Readers mention it's a necessary view on information security and protecting an enterprise. The book is great for anyone in IT or cybersecurity.

"...Paul Asadorian, I have come to appreciate them both as excellent security practitioners and the fact they are more than willing to share their..." Read more

"...These techniques are very useful. It's perfectly legal to protect yourself and as pentesters, John Strand and Paul Asadoorian know exactly how to..." Read more

"...Counter attacking will require lots of maturity, careful strategy and almost flawless execution...." Read more

"This book is great for anyone in IT or cybersecurity. It is so detailed that it makes it easy to replicate concepts in the book." Read more

Top reviews from the United States

  • Reviewed in the United States on December 18, 2013
    Having attended many webcasts of John Stand and Paul Asadorian, I have come to appreciate them both as excellent security practitioners and the fact they are more than willing to share their knowledge. This book is a compilation of many of their webcasts/teachings and it explains the idea of active defense and also touches on ADHD (Active Defense Harbinger Distribution); ADHD is meant to help tilt the scales of security back into the hands of the defenders and/or at least give them a more level playing field. I originally purchased this book simply to support them and their knowledge crusade, however, I read the book and then went back through it to try all of their theories against my own techniques and I have to say they work extremely well. Absolutely essential for anyone looking for the next step beyond OS patching, updated anti-virus, IDS/IPS, etc. -- DH
  • Reviewed in the United States on December 5, 2015
    Those who overlook countermeasures as an integral component of security will surely fail in their roles as protectors. OCM is an excellent overview of the topic and a better than entry level introduction.

    I remember coding countermeasures in the early days designed specifically to take compromised systems promiscuously engaged in the act of attacking other systems off-line and display a helpful boot screen for the target systems' administrators. We were never destructive or vindictive and always treated such responses unapologetically as self-defense; because that is exactly what it was.

    Law enforcement does not protect, moves at glacial speeds, and will generally defer from action unless a successful prosecution is assured (or the pubic noise level demands it). (Don't misunderstand me, I have the highest respect for first responders.) It is therefore incumbent for those of us with the skills to responsibly protect our infrastructure using measured responses consistent with threat level.

    OCM does exactly what it intends by succinctly covering the important elements of this neglected topic and furthers a much needed discussion. Highly recommended.
    2 people found this helpful
    Report
  • Reviewed in the United States on July 17, 2016
    However, the book could use an editor. As many other reviewers have noted, the specific methods to implement the active defenses are missing or only briefly described; but this book is an introduction, not an implementation manual. When they publish a second edition, I would recommend: (1) a table of contents, (2) an index, (3) spelling out acronyms or including an acronym table, (4) using some sort of style guide for references (e.g., IEEE, APA), (5) providing legible graphics (i.e., several screenshots are grainy and hard to read, (6) provide references to figures and graphics; its not always clear where in the text the explanation of the graphics exist, (7) add page numbers, (8) use consistent fonts and line spacing. These many minor issues combine to make this otherwise very readable book a challenge to get through. I’d give the book 5 stars on content and 3 on execution.
    8 people found this helpful
    Report
  • Reviewed in the United States on July 6, 2013
    I was lucky enough to take the Offensive Countermeasures class last year at Black Hat. This book has the great material of the class in a more portable format.

    These techniques are very useful. It's perfectly legal to protect yourself and as pentesters, John Strand and Paul Asadoorian know exactly how to drive attackers insane. I've used some of these programs on my home network and I've recommended them to people running their own websites. I work at a large company where they don't let me touch the perimeter but I can still use this information.

    If you're at all interested in information security you should get this book. There's a lot an active defender can do legally and safely to make themselves a less attractive target. The book is also well written, much better than most information security books.
    3 people found this helpful
    Report
  • Reviewed in the United States on October 9, 2013
    The book expands upon the tools and concepts utilized in the active defense suite. I purchased the book, because I appreciate the work they have put into that suite. That being said, I feel the book leaves a lot to be desired. The whole book seems rushed. Typos and errors abound. I was also expecting a little more depth into legality. For those new to the idea of actively defending networks or security in general, this is still a good read. For those with a little more experience, just view the Derbycon talk and download AD.
    9 people found this helpful
    Report
  • Reviewed in the United States on July 10, 2019
    I have no questions in my mind that as stakes get higher and legislation evolves, at least deception will be the norm. That in itself will tax hackers and force them to spend more resources and maybe, just maybe, get noisier and make detectable mistakes.

    Counter attacking will require lots of maturity, careful strategy and almost flawless execution. If we are going to poke the hornet’s next, better be ready, bluffing won’t work.

    To the minimum, the list of tools and techniques are a great read and worth a try in a controlled environment to say the least.
  • Reviewed in the United States on January 31, 2023
    This book is great for anyone in IT or cybersecurity. It is so detailed that it makes it easy to replicate concepts in the book.
  • Reviewed in the United States on December 1, 2017
    If you work in information security, I make the reasonable assumption that you’re not an idiot. That being said, if you take this book for what it is, an introduction to topics and a novel way of approaching cyber defense, then this is a great book to get your mind in the right line of thinking, and it will set you down an amazing research path that will make you a better network defender. If you expect this book to be the definitive how to guide or a “Network Defense for Dummies”, then you’ll be disappointed. But you’re a smart person. You know that every network environment is unique so defensive measures need to be customized by independent thinkers, and if you use this book as a starting point, you can Google the rest, learn new skills on your own, and become a doggone hero to your organization.
    11 people found this helpful
    Report

Top reviews from other countries

Translate all reviews to English
  • Cliente
    5.0 out of 5 stars Nice!!!
    Reviewed in Brazil on March 5, 2022
    Nice!!!
  • Paul Market
    5.0 out of 5 stars Paradigmatico
    Reviewed in Mexico on July 28, 2020
    Apasionantes técnicas de cyber desde una perspectiva militar. Que deber ya de ponerse en práctica en las compañias privadas.
  • Amazon Customer
    5.0 out of 5 stars N/a
    Reviewed in Canada on October 12, 2018
    Best book ever purchased
  • B
    4.0 out of 5 stars Intéressant, mais...
    Reviewed in France on September 12, 2017
    Le point de vue exposé est intéressant, mais pour un deuxième opus, on aurait préféré lire une réflexion plus approfondie sur les concepts de défense active et pas seulement la présentation technique de quelques outils. Cependant, il s'agit d'un bon état de l'art technique qui permet de rapidement s'initier à ce sujet d'avenir.
  • Shan Lee
    5.0 out of 5 stars An excellent introduction to a different way of thinking about Information Security
    Reviewed in the United Kingdom on August 16, 2013
    Very easy to read with clear, simple examples to follow. I was hooked early on and now want to spend more time investigating just how I can put some of these principles into practice. Nothing less than I expected from the likes of John & Paul. Thanks -- SecWaza