Amazon Prime Free Trial
FREE Delivery is available to Prime members. To join, select "Try Amazon Prime and start saving today with FREE Delivery" below the Add to Cart button and confirm your Prime free trial.
Amazon Prime members enjoy:- Cardmembers earn 5% Back at Amazon.com with a Prime Credit Card.
- Unlimited FREE Prime delivery
- Streaming of thousands of movies and TV shows with limited ads on Prime Video.
- A Kindle book to borrow for free each month - with no due dates
- Listen to over 2 million songs and hundreds of playlists
Important: Your credit card will NOT be charged when you start your free trial or if you cancel during the trial period. If you're happy with Amazon Prime, do nothing. At the end of the free trial, your membership will automatically upgrade to a monthly membership.
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Offensive Countermeasures Paperback – August 21, 2017
Purchase options and add-ons
- Print length170 pages
- LanguageEnglish
- Publication dateAugust 21, 2017
- Dimensions6 x 0.4 x 9 inches
- ISBN-101974671690
- ISBN-13978-1974671694
Book recommendations, author interviews, editors' picks, and more. Read it now.
Frequently bought together
Customers who viewed this item also viewed
Product details
- Publisher : CreateSpace Independent Publishing Platform (August 21, 2017)
- Language : English
- Paperback : 170 pages
- ISBN-10 : 1974671690
- ISBN-13 : 978-1974671694
- Item Weight : 1 pounds
- Dimensions : 6 x 0.4 x 9 inches
- Best Sellers Rank: #261,151 in Books (See Top 100 in Books)
- Customer Reviews:
About the author
Discover more of the author’s books, see similar authors, read book recommendations and more.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonCustomers say
Customers find the book provides an excellent overview of the topic with a good review of high-level concepts. They find it well-written and a nice reference. Readers appreciate the new perspective on defensive security and hands-on active defense techniques.
AI-generated from the text of customer reviews
Customers find this book provides a good overview of the topic. They appreciate the well-presented information and new inspiration it provides. The book provides a good review of high-level concepts with some minor depth. It gives them lots of knowledge and new inspiration, and is a nice reference for tools and techniques that are worth trying. The tactics and countermeasures provided against common attacks are explained succinctly and in detail, making it easy to replicate concepts.
"...OCM is an excellent overview of the topic and a better than entry level introduction...." Read more
"...These techniques are very useful...." Read more
"...To the minimum, the list of tools and techniques are a great read and worth a try in a controlled environment to say the least." Read more
"This book is great for anyone in IT or cybersecurity. It is so detailed that it makes it easy to replicate concepts in the book." Read more
Customers find the book well-written and easy to understand. They appreciate the fresh strategies and practical examples using modern tools. Many readers find it better than most information security books, making it accessible for less technical readers.
"...The book is also well written, much better than most information security books." Read more
"...There are some fresh strategies that are worth reviewing and discussion of their merits." Read more
"This book is good for what it is. It is not an academic InfoSec book...." Read more
"...Great read overall, and I would highly recommend this for anyone in the information security field." Read more
Customers find the book provides a new perspective on defensive security and countermeasures. They say it's a great way to get into the field of active defense, with hands-on techniques. Readers mention it's a necessary view on information security and protecting an enterprise. The book is great for anyone in IT or cybersecurity.
"...Paul Asadorian, I have come to appreciate them both as excellent security practitioners and the fact they are more than willing to share their..." Read more
"...These techniques are very useful. It's perfectly legal to protect yourself and as pentesters, John Strand and Paul Asadoorian know exactly how to..." Read more
"...Counter attacking will require lots of maturity, careful strategy and almost flawless execution...." Read more
"This book is great for anyone in IT or cybersecurity. It is so detailed that it makes it easy to replicate concepts in the book." Read more
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
- Reviewed in the United States on December 18, 2013Having attended many webcasts of John Stand and Paul Asadorian, I have come to appreciate them both as excellent security practitioners and the fact they are more than willing to share their knowledge. This book is a compilation of many of their webcasts/teachings and it explains the idea of active defense and also touches on ADHD (Active Defense Harbinger Distribution); ADHD is meant to help tilt the scales of security back into the hands of the defenders and/or at least give them a more level playing field. I originally purchased this book simply to support them and their knowledge crusade, however, I read the book and then went back through it to try all of their theories against my own techniques and I have to say they work extremely well. Absolutely essential for anyone looking for the next step beyond OS patching, updated anti-virus, IDS/IPS, etc. -- DH
- Reviewed in the United States on December 5, 2015Those who overlook countermeasures as an integral component of security will surely fail in their roles as protectors. OCM is an excellent overview of the topic and a better than entry level introduction.
I remember coding countermeasures in the early days designed specifically to take compromised systems promiscuously engaged in the act of attacking other systems off-line and display a helpful boot screen for the target systems' administrators. We were never destructive or vindictive and always treated such responses unapologetically as self-defense; because that is exactly what it was.
Law enforcement does not protect, moves at glacial speeds, and will generally defer from action unless a successful prosecution is assured (or the pubic noise level demands it). (Don't misunderstand me, I have the highest respect for first responders.) It is therefore incumbent for those of us with the skills to responsibly protect our infrastructure using measured responses consistent with threat level.
OCM does exactly what it intends by succinctly covering the important elements of this neglected topic and furthers a much needed discussion. Highly recommended.
- Reviewed in the United States on July 17, 2016However, the book could use an editor. As many other reviewers have noted, the specific methods to implement the active defenses are missing or only briefly described; but this book is an introduction, not an implementation manual. When they publish a second edition, I would recommend: (1) a table of contents, (2) an index, (3) spelling out acronyms or including an acronym table, (4) using some sort of style guide for references (e.g., IEEE, APA), (5) providing legible graphics (i.e., several screenshots are grainy and hard to read, (6) provide references to figures and graphics; its not always clear where in the text the explanation of the graphics exist, (7) add page numbers, (8) use consistent fonts and line spacing. These many minor issues combine to make this otherwise very readable book a challenge to get through. I’d give the book 5 stars on content and 3 on execution.
- Reviewed in the United States on July 6, 2013I was lucky enough to take the Offensive Countermeasures class last year at Black Hat. This book has the great material of the class in a more portable format.
These techniques are very useful. It's perfectly legal to protect yourself and as pentesters, John Strand and Paul Asadoorian know exactly how to drive attackers insane. I've used some of these programs on my home network and I've recommended them to people running their own websites. I work at a large company where they don't let me touch the perimeter but I can still use this information.
If you're at all interested in information security you should get this book. There's a lot an active defender can do legally and safely to make themselves a less attractive target. The book is also well written, much better than most information security books.
- Reviewed in the United States on October 9, 2013The book expands upon the tools and concepts utilized in the active defense suite. I purchased the book, because I appreciate the work they have put into that suite. That being said, I feel the book leaves a lot to be desired. The whole book seems rushed. Typos and errors abound. I was also expecting a little more depth into legality. For those new to the idea of actively defending networks or security in general, this is still a good read. For those with a little more experience, just view the Derbycon talk and download AD.
- Reviewed in the United States on July 10, 2019I have no questions in my mind that as stakes get higher and legislation evolves, at least deception will be the norm. That in itself will tax hackers and force them to spend more resources and maybe, just maybe, get noisier and make detectable mistakes.
Counter attacking will require lots of maturity, careful strategy and almost flawless execution. If we are going to poke the hornet’s next, better be ready, bluffing won’t work.
To the minimum, the list of tools and techniques are a great read and worth a try in a controlled environment to say the least.
- Reviewed in the United States on January 31, 2023This book is great for anyone in IT or cybersecurity. It is so detailed that it makes it easy to replicate concepts in the book.
- Reviewed in the United States on December 1, 2017If you work in information security, I make the reasonable assumption that you’re not an idiot. That being said, if you take this book for what it is, an introduction to topics and a novel way of approaching cyber defense, then this is a great book to get your mind in the right line of thinking, and it will set you down an amazing research path that will make you a better network defender. If you expect this book to be the definitive how to guide or a “Network Defense for Dummies”, then you’ll be disappointed. But you’re a smart person. You know that every network environment is unique so defensive measures need to be customized by independent thinkers, and if you use this book as a starting point, you can Google the rest, learn new skills on your own, and become a doggone hero to your organization.
Top reviews from other countries
- ClienteReviewed in Brazil on March 5, 2022
5.0 out of 5 stars Nice!!!
Nice!!!
-
Paul MarketReviewed in Mexico on July 28, 2020
5.0 out of 5 stars Paradigmatico
Apasionantes técnicas de cyber desde una perspectiva militar. Que deber ya de ponerse en práctica en las compañias privadas.
- Amazon CustomerReviewed in Canada on October 12, 2018
5.0 out of 5 stars N/a
Best book ever purchased
-
BReviewed in France on September 12, 2017
4.0 out of 5 stars Intéressant, mais...
Le point de vue exposé est intéressant, mais pour un deuxième opus, on aurait préféré lire une réflexion plus approfondie sur les concepts de défense active et pas seulement la présentation technique de quelques outils. Cependant, il s'agit d'un bon état de l'art technique qui permet de rapidement s'initier à ce sujet d'avenir.
- Shan LeeReviewed in the United Kingdom on August 16, 2013
5.0 out of 5 stars An excellent introduction to a different way of thinking about Information Security
Very easy to read with clear, simple examples to follow. I was hooked early on and now want to spend more time investigating just how I can put some of these principles into practice. Nothing less than I expected from the likes of John & Paul. Thanks -- SecWaza