Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas
Book Review: Red Team Development and Operations by Joe Vest and James Tubberville

Uday Mittal February 24, 2021

Book Review: Red Team Development and Operations by Joe Vest and James Tubberville

I recently picked up this book, Red Team Development and Operations by Joe Vest and James Tubberville, while searching for material to read on Red Teaming. While this is not the only book on the subject, I was intrigued by the ‘Zero-Day Edition’ (along with this content, of course). Also, it was published recently (at […]

Filed Under: Book Reviews, Good Reads, Non-Fiction Tagged With: Cybersecurity books, red teaming

Introduction to MITRE ATT&CK Framework

Uday Mittal January 13, 2021

Introduction to MITRE ATT&CK Framework

  This post is part of our course Adversary Emulation 101: Mimicking a real-world cyber attack. If you want to beat your adversaries, think like them. A common adage we have all heard. MITRE ATT&CK is just that. A framework to think like adversaries and beat them in their game. It is a culmination of […]

Filed Under: Adversary Emulation Tagged With: Penetration Testing, red teaming

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

(ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security command and control crte crtp cyber-warfare Cyber Security cybersecurity Cybersecurity books Cybersecurity Cannon domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mass Surveillance Narendra Modi offensive security Online Safety opsec Password Penetration Testing pentest poshc2 powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration

Top Posts

  • Red Team Operations Attack Lifecycle
    Red Team Operations Attack Lifecycle
  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands
  • DCPP: Everything You Need to Know
    DCPP: Everything You Need to Know
  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera
  • AD Exploitation using ADSI - Part 1 (Introduction)
    AD Exploitation using ADSI - Part 1 (Introduction)
  • ADSISearcher (Part 2)
    ADSISearcher (Part 2)

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress