Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Incident Response for Windows
  • Table Of Contents Toc
  • Feedback & Rating feedback
Incident Response for Windows

Incident Response for Windows

By : Tykushin, Ostrovskaya
4.8 (9)
close
close
Incident Response for Windows

Incident Response for Windows

4.8 (9)
By: Tykushin, Ostrovskaya

Overview of this book

Cybersecurity incidents are becoming increasingly common and costly, making incident response a critical domain for organizations to understand and implement. This book enables you to effectively detect, respond to, and prevent cyberattacks on Windows-based systems by equipping you with the knowledge and tools needed to safeguard your organization's critical assets, in line with the current threat landscape. The book begins by introducing you to modern sophisticated cyberattacks, including threat actors, methods, and motivations. Then, the phases of efficient incident response are linked to the attack's life cycle using a unified cyber kill chain. As you advance, you'll explore various types of Windows-based platform endpoint forensic evidence and the arsenal necessary to gain full visibility of the Windows infrastructure. The concluding chapters discuss the best practices in the threat hunting process, along with proactive approaches that you can take to discover cybersecurity incidents before they reach their final stage. By the end of this book, you’ll have gained the skills necessary to run intelligence-driven incident response in a Windows environment, establishing a full-fledged incident response and management process, as well as proactive methodologies to enhance the cybersecurity posture of an enterprise environment.
Table of Contents (20 chapters)
close
close
1
Part 1: Understanding the Threat Landscape and Attack Life Cycle
4
Part 2: Incident Response Procedures and Endpoint Forensic Evidence Collection
7
Part 3: Incident Analysis and Threat Hunting on Windows Systems
15
Part 4: Incident Investigation Management and Reporting

Summary

Once advanced threat actors gain access to the victim infrastructure, they perform a series of actions that allow them to gain a foothold in a system, escalate their privileges, evade defenses, and access credentials if necessary. These actions are essential to further develop an attack, increase their presence in the target infrastructure, and achieve the threat actors’ final goals.

Despite their different purposes, the techniques used by threat actors to gain a foothold and escalate privileges are often the same or very similar. This fact allows us to focus not on finding traces of each technique but, rather, on analyzing the main sources, such as event logs, registries, filesystem metafiles, and system files. Analyzing these sources is also useful for detecting defense evasion.

Identification of the techniques used to investigate credential access techniques, as well as methods of communication with control servers, usually occurs in parallel with the analysis...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech

Create a Note

Modal Close icon
You need to login to use this feature.
notes
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY