Red Team Techniques for Windows AD & Network Penetration
Practical Red Teaming, Network Penetration and Active Directory Attacks
By Wills H. Holmes
Unlock the real tactics and tools used by modern adversaries to compromise Windows Active Directory and enterprise networks. Whether you're a penetration tester, security analyst, or red team operator, this hands-on guide equips you with the skills, mindset, and techniques needed to emulate real-world attackers in high-stakes environments.
This comprehensive red team field manual walks you through every phase of an engagement-from reconnaissance and payload delivery to domain dominance and stealthy persistence. You'll master practical adversary simulation across Windows domains using up-to-date tools such as Cobalt Strike, Sliver, BloodHound, Rubeus, Mimikatz, and advanced PowerShell tradecraft. Covering everything from Kerberoasting and AS-REP roasting to DCSync and Active Directory Certificate Services (ADCS) abuse, this book dives deep into the attack surface defenders fear most.
Inside you'll learn how to:
Perform OSINT, phishing, and initial access against hardened environments
Exploit Windows misconfigurations, escalate privileges, and move laterally
Build covert Command and Control (C2) infrastructures using encrypted channels
Simulate ransomware and data exfiltration without real-world damage
Bypass EDR, AMSI, and Windows Defender using low-level evasion techniques
Deliver clear red team reports and risk-based remediation guidance
Whether you're preparing for red team certifications, building a lab, or operationalizing threat emulation, this book is your tactical playbook for offensive security success.
About the Author:
Wills H. Holmes is a seasoned offensive security expert with deep experience in red team operations, adversary emulation, and Active Directory exploitation. Known for bridging technical precision with real-world relevance, Holmes delivers concise, battle-tested knowledge in every chapter.
In a landscape dominated by ransomware and advanced persistent threats, defenders need adversaries who think, move, and act like real attackers. This book brings you into that mindset-with up-to-date techniques aligned to today's threats and tomorrow's challenges.
外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。
無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。
為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。
若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。