menu
{ "item_title" : "Persistence in Active Directory", "item_author" : [" Mikhailen Vostorov "], "item_description" : "Persistence is the quiet art of staying put. In Active Directory environments, it's the difference between a minor security incident and a months-long breach that costs millions.I'm Mikhailen Vostorov, and in Persistence in Active Directory: Red Team Tactics and Evasion Methods, I'll show you exactly how attackers establish long-term footholds in AD environments - and how defenders detect, hunt, and eliminate them.What You'll LearnThis book delivers hands-on, practical knowledge of Active Directory persistence techniques used in real-world attacks:Account-Based Persistence - Hidden admins, skeleton keys, and DSRM abuseGPO Exploitation - Group Policy manipulation for persistent accessService & Scheduled Task Abuse - Maintaining access through legitimate Windows featuresRegistry & WMI Tricks - Stealthy persistence using built-in mechanismsKerberos Attacks - Golden Tickets, Silver Tickets, and certificate-based persistenceAD Object Tampering - Schema modifications and AdminSDHolder abuseDLL & COM Hijacking - Application-level persistence without detectionFileless Techniques - Memory-resident payloads that evade traditional defensesCloud & Hybrid Persistence - Azure AD Connect exploitation and cross-environment attacksEvery technique includes defender-focused detection methods, SIEM hunting queries, and incident response playbooks you can implement immediately.Who This Book Is ForRed Teamers & Penetration Testers: Refine your offensive tradecraft with realistic, ethical persistence scenarios that mirror actual APT campaigns.Blue Teamers & SOC Analysts: Build robust detection rules and hunting strategies to identify covert access before it becomes a breach.Incident Responders: Get actionable containment steps and forensic indicators to evict persistent attackers from compromised environments.Security Architects: Understand attacker methodology to design resilient Active Directory infrastructures.Part of the Active Directory Exploited SeriesThis volume integrates seamlessly with the complete ethical hacker's collection, covering AD reconnaissance, initial access, privilege escalation, lateral movement, persistence, cloud attacks, and comprehensive defensive strategies.New to Active Directory? Start with Active Directory for Beginners. Want hands-on practice? Pair this with the Active Directory Hacking Lab Manual. Prefer defense-first approaches? Complement with Active Directory Defense: Detecting and Stopping Real-World Cyber Attacks.Why This Book Is DifferentPractical, Not Theoretical: Real attack scenarios from actual investigations (anonymized and ethically presented)Defender-First Mindset: Every offensive technique paired with detection and mitigation strategiesSIEM-Ready Content: Copy-paste hunting queries and detection rules for Splunk, Elastic, Microsoft Sentinel, and moreNo Reckless Recipes: Responsible disclosure of techniques with emphasis on authorized testing and ethical boundariesEngaging Writing: Coffee-fueled, witty, and candid - cybersecurity content that refuses to be boringYour Next StepWhether you're hardening an enterprise network, building detection capabilities, or conducting authorized security assessments, this book teaches you to think like an attacker so you can stop one.Ready to master Active Directory persistence and elevate your cybersecurity skills?Open the book, pour a strong coffee, and let's get to work.", "item_img_path" : "https://covers2.booksamillion.com/covers/bam/9/79/824/252/9798242523449_b.jpg", "price_data" : { "retail_price" : "39.99", "online_price" : "39.99", "our_price" : "39.99", "club_price" : "39.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Persistence in Active Directory|Mikhailen Vostorov

Persistence in Active Directory : Red Team Tactics and Evasion Methods

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Persistence is the quiet art of staying put. In Active Directory environments, it's the difference between a minor security incident and a months-long breach that costs millions.

I'm Mikhailen Vostorov, and in Persistence in Active Directory: Red Team Tactics and Evasion Methods, I'll show you exactly how attackers establish long-term footholds in AD environments - and how defenders detect, hunt, and eliminate them.

What You'll Learn

This book delivers hands-on, practical knowledge of Active Directory persistence techniques used in real-world attacks:

  • Account-Based Persistence - Hidden admins, skeleton keys, and DSRM abuse
  • GPO Exploitation - Group Policy manipulation for persistent access
  • Service & Scheduled Task Abuse - Maintaining access through legitimate Windows features
  • Registry & WMI Tricks - Stealthy persistence using built-in mechanisms
  • Kerberos Attacks - Golden Tickets, Silver Tickets, and certificate-based persistence
  • AD Object Tampering - Schema modifications and AdminSDHolder abuse
  • DLL & COM Hijacking - Application-level persistence without detection
  • Fileless Techniques - Memory-resident payloads that evade traditional defenses
  • Cloud & Hybrid Persistence - Azure AD Connect exploitation and cross-environment attacks

Every technique includes defender-focused detection methods, SIEM hunting queries, and incident response playbooks you can implement immediately.

Who This Book Is For

Red Teamers & Penetration Testers: Refine your offensive tradecraft with realistic, ethical persistence scenarios that mirror actual APT campaigns.

Blue Teamers & SOC Analysts: Build robust detection rules and hunting strategies to identify covert access before it becomes a breach.

Incident Responders: Get actionable containment steps and forensic indicators to evict persistent attackers from compromised environments.

Security Architects: Understand attacker methodology to design resilient Active Directory infrastructures.

Part of the Active Directory Exploited Series

This volume integrates seamlessly with the complete ethical hacker's collection, covering AD reconnaissance, initial access, privilege escalation, lateral movement, persistence, cloud attacks, and comprehensive defensive strategies.

New to Active Directory? Start with Active Directory for Beginners. Want hands-on practice? Pair this with the Active Directory Hacking Lab Manual. Prefer defense-first approaches? Complement with Active Directory Defense: Detecting and Stopping Real-World Cyber Attacks.

Why This Book Is Different

  • Practical, Not Theoretical: Real attack scenarios from actual investigations (anonymized and ethically presented)
  • Defender-First Mindset: Every offensive technique paired with detection and mitigation strategies
  • SIEM-Ready Content: Copy-paste hunting queries and detection rules for Splunk, Elastic, Microsoft Sentinel, and more
  • No Reckless Recipes: Responsible disclosure of techniques with emphasis on authorized testing and ethical boundaries
  • Engaging Writing: Coffee-fueled, witty, and candid - cybersecurity content that refuses to be boring

Your Next Step

Whether you're hardening an enterprise network, building detection capabilities, or conducting authorized security assessments, this book teaches you to think like an attacker so you can stop one.

Ready to master Active Directory persistence and elevate your cybersecurity skills?

Open the book, pour a strong coffee, and let's get to work.

This item is Non-Returnable

Details

  • ISBN-13: 9798242523449
  • ISBN-10: 9798242523449
  • Publisher: Independently Published
  • Publish Date: January 2026
  • Dimensions: 11 x 8.5 x 0.7 inches
  • Shipping Weight: 1.73 pounds
  • Page Count: 338

Related Categories

You May Also Like...

    1

BAM Customer Reviews