Tribe of Hackers Security Leaders: Tribal Knowledge from the best in Cybersecurity Leadership (Wiley, ISBN 1119643775)
Cybersecurity leadership is about recruiting and leading teams of hackers―not always an easy task, but one that could make or break your organization’s secure future. From the authors who brought you the bestselling Tribe of Hackers comes Tribe of Hackers Security Leaders, a collection of invaluable real-world insights from the world’s leading cybersecurity experts. This book offers perspectives on cybersecurity leadership issues such as talent acquisition, working productively with teams across the organization, and leading teams to success. The book features interviews with Lares COO Andrew Hay and Lares VP, Advisory Services, Mark Arnold.
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity (Wiley, ISBN 1119643325)
The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world’s leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity takes the valuable lessons and popular interview format from the original Tribe of Hackers and dives deeper into the world of Red Team security with expert perspectives on issues like penetration testing and ethical hacking. This unique guide includes inspiring interviews from influential security specialists, including David Kennedy, Rob Fuller, Jayson E. Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more. The book features an interview with Lares CEO Chris Nickerson.
This book is the definitive guide on the OSSEC Host-based Intrusion Detection system and frankly, to really use OSSEC you are going to need a definitive guide. Authored by Lares COO Andrew Hay.
Nagios 3 Enterprise Network Monitoring can help you harness the full power of Nagios in your organization. Co-authored by Lares COO Andrew Hay.
The Nokia Firewall, VPN, and IPSO Configuration Guide provides seasoned network administrators and security professionals with the in-depth coverage and step-by-step walkthroughs they require to properly secure their network perimeters and ensure safe connectivity for remote users. Co-authored by Lares COO Andrew Hay.
The OpenStack Security Guide is the result of a five day sprint of collaborative work of many individuals. The purpose of this document is to provide the best practice guidelines for deploying a secure OpenStack cloud. It is designed to reflect the current state of security within the OpenStack community and provide frameworks for decision making where listing specific security controls are not feasible due to complexity or other environment specific details. Co-authored by Lares COO Andrew Hay.
This document provides guidance on the use of cloud technologies and considerations for maintaining PCI DSS controls in cloud environments. This guidance builds on that provided in the PCI DSS Virtualization Guidelines and is intended for organizations using, or thinking of using, providing, or assessing cloud technologies as part of a cardholder data environment (CDE). Contributed to by Lares COO Andrew Hay.
WarDriving: Drive, Detect, Defend: A Guide to Wireless Security (Syngress, ISBN 1931836035)
The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has sparked intense debate amongst lawmakers, security professionals, and the telecommunications industry. This first ever book on WarDriving is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in very major, metropolitan area worldwide. These insiders also provide the information to secure your wireless network before it is exploited by criminal hackers. Expertise provided by Lares Red Team Manager Tim McGuffin.
Penetration Tester’s Open Source Toolkit, Vol. 2 (Syngress, ISBN 1597492132)
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pentesting applications included with BackTrack 2 to the pen tester’s toolkit. It includes the latest information on Snort, Nessus, Wireshark, Metasploit, Kismet and all of the other major Open Source platforms. Expertise provided by Lares Red Team Manager Tim McGuffin.
Hash Crack: Password Cracking Manual (v3) (ISBN 1793458618)
The Hash Crack: Password Cracking Manual v3 is an expanded reference guide for password recovery (cracking) methods, tools, and analysis techniques. A compilation of basic and advanced techniques to assist penetration testers and network security professionals evaluate their organization’s posture. The Hash Crack manual contains syntax and examples for the most popular cracking and analysis tools and will save you hours of research looking up tool usage. It also includes basic cracking knowledge and methodologies every security professional should know when dealing with password attack capabilities. Hash Crack contains all the tables, commands, online resources, and more to complete your cracking security kit. This version expands on techniques to extract hashes from a myriad of operating systems, devices, data, files, and images. Lastly, it contains updated tool usage and syntax for the most popular cracking tools. Expertise provided by Lares Red Team Manager Tim McGuffin.
Expertise provided by Lares Red Team Manager Tim McGuffin.