Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.

Paperback – August 3, 2014
164
English
1500734756
9781500734756
02 Aug
BTHb:INRE - Version 2.2 now available. Voted #3 of the 100 Best Cyber Security Books of All Time by Vinod Khosla, Tim O'Reilly and Marcus Spoons Stevens on BookAuthority.com as of 06/09/2018! The Blue Team Handbook is a "zero fluff" reference guide for cyber security incident responders, security engineers, and InfoSec pros alike. The BTHb includes essential information in a condensed handbook format. Main topics include the incident response process, how attackers work, common tools for incident response, a methodology for network analysis, common indicators of compromise, Windows and Linux analysis processes, tcpdump usage examples, Snort IDS usage, packet headers, and numerous other quick reference topics. The book is designed specifically to share "real life experience", so it is peppered with practical techniques from the authors' extensive career in handling incidents. Whether you are writing up your cases notes, analyzing potentially suspicious traffic, or called in to look over a misbehaving server – this book should help you handle the case and teach you some new techniques along the way.


Version 2.2 updates:
- *** A new chapter on Indicators of Compromise added.
- Table format slightly revised throughout book to improve readability.
- Dozens of paragraphs updated and expanded for readability and completeness.
- 15 pages of new content since version 2.0.

Reviews (152)

Not Perfectly Pocket Size, but Sufficient

Fits in the jump bag & a zip lock to protect the pages - Crafted my own pocket flap inserts to add personal notes for my employer on large index cards (org chart by title with penciled in names, numbers & schedules); IT LAN map with details on each system in case it is needed in a jiff (except passwords - don't be stupid!) It didn't help me pass the minors, but I am a non-military female. I don't think God could have gotten me through those men who love to fail women!

Blue Team Must Have

This is a must-have for blue-team / defensive and red-team/ offensive folks. It provides a great jump-off point for a lot of security monitoring skills, and has a very rugged feel to it that tells you its written by someone with a lot of experience. The first 35 pages or so is process / paperwork related stuff, but everything after that is high-signal and very useful.

Original review was 4 stars...

Simply because I didnt know what I was doing. This manual will grow with you. I have added and taken away some tips and tripsnof my own. Awesome read!

Great Handbook.

Great. Between this and RTFM, I keep these always within reach.

Deep dive of crucial information for when the worst is happening for your organization's information security

Deep dive of crucial information for when the worst is happening for your organization's information security. Very packed and concise. Loaded with tips and useful information I haven't seen anywhere else.

Excellent Resource

This book is a must read for those responsible for developing and implementing an IR plan and team.

Five Stars

Excellent!

AAAAAAMAZING Book to get to know IR

Highly recommended

Threat handling

Great info for dealing with the threats

Great content and reference material

Great content and reference material. I hope they can update the content to make it more relevant to current OS versions.

Not Perfectly Pocket Size, but Sufficient

Fits in the jump bag & a zip lock to protect the pages - Crafted my own pocket flap inserts to add personal notes for my employer on large index cards (org chart by title with penciled in names, numbers & schedules); IT LAN map with details on each system in case it is needed in a jiff (except passwords - don't be stupid!) It didn't help me pass the minors, but I am a non-military female. I don't think God could have gotten me through those men who love to fail women!

Blue Team Must Have

This is a must-have for blue-team / defensive and red-team/ offensive folks. It provides a great jump-off point for a lot of security monitoring skills, and has a very rugged feel to it that tells you its written by someone with a lot of experience. The first 35 pages or so is process / paperwork related stuff, but everything after that is high-signal and very useful.

Original review was 4 stars...

Simply because I didnt know what I was doing. This manual will grow with you. I have added and taken away some tips and tripsnof my own. Awesome read!

Great Handbook.

Great. Between this and RTFM, I keep these always within reach.

Deep dive of crucial information for when the worst is happening for your organization's information security

Deep dive of crucial information for when the worst is happening for your organization's information security. Very packed and concise. Loaded with tips and useful information I haven't seen anywhere else.

Excellent Resource

This book is a must read for those responsible for developing and implementing an IR plan and team.

Five Stars

Excellent!

AAAAAAMAZING Book to get to know IR

Highly recommended

Threat handling

Great info for dealing with the threats

Great content and reference material

Great content and reference material. I hope they can update the content to make it more relevant to current OS versions.

As described

informative book

A handy for incident response

If your a blue teamer keep this is a must have guide. No nonsense of reading through dozens of pages to find what you need.

Five Stars

The book has come in handy sorry for not reviewing it as its been two years

Informative

Book has Nice feel and laid out well.

Great Read, and Awesome Resource.

Great Book to give insight to the blue team side. It has some of that simple common sense stuff. But it takes that and puts it into a plan! Very deep insight into the importance of being prepared and explaining why. Also has some cool more advance advice to read up on. Gives command line examples of different parameters to use and shows the result you will get.

Needs new version

This book is good, but is deprecated at this point, does need a new version as this one was released in 2014, there are plenty of items that have changed within

Five Stars

Perfect

Great book for Blue Team

Great Blue Team handbook will great offensive attack commands

Incredibly Useful. Repurchased for version 2.0

I was recommended this Handbook by an Incident Responder with over 10 years experience (whom was also recommended it within his professional network). I've been utilizing version 1.0 of this handbook for almost 3 months now and, I must say, it's the perfect field manual not only for Incident Responders but for any class of Information Security Professional. Back in college I started crafting a reference manual of my own wishing I had something like this. I'm happy to see that I wasn't the only person when I was recommended this Handbook. Initially my only wish was for it to have had reference diagrams for common packet headers. However, shortly after that I learned of version 2.0. For that reason, I immediately purchased version 2.0. Background: 3 years experience as an Information Security Analyst

Great book

Very comprehensive

Blue Team

Great book, as a newer person to the detail of IR this book is providing reference material I needed.

Three Stars

good reference

Five Stars

When Red and Blue meet this is a must have to win!

Great reference with a dash of context

Great reference with a dash of context. A lot of you will probably have a .doc or .txt with some of this stuff in it, but now you don't have to print it all out. :) Recommended for any admin not just the sec folk.

I found this book to be a little optimistic and perfect world geared

As a red team guy, I found this book to be a little optimistic and perfect world geared, but it did have good idea and insight

Very usefull

Love it! Small and focus on the most important aspects we should consider.

excellent book

Very clear, excellent book

Even the red teamers like it.

The perfect counterbalance to RTFM for anyone doing compsec.

but this is a great book to have on

impressive book, very detailed, found some parts difficult to understand, but this is a great book to have on hand

Five Stars

great book

Its a great reference book and explains incident response in a step ...

Well written and straight to the point. Its a great reference book and explains incident response in a step by step fashion.

Tech Work around Book

This is a Most Excellent Book and well worth the money. My Son whom is a programmer loves it.

Gave as a gift, receiver was very excited.

Gave as a gift, receiver was very excited.

Four Stars

This is good for those who need a refresher or are new to the field of InfoSec.

Awesome

Must have

A good book and it can come in handy

As advertised. A good book and it can come in handy.

Five Stars

Must have book.

Buen contenido

Muy buena infornación

Good reference. Have read it completely and think its ...

Good reference. Have read it completely and think its going to be very helpful. Have also started adding my own notes. Good addition to my library. A better index would be nice.

Proff

Very good

Four Stars

Good fast read, and cuts to the chase.

Five Stars

Good stuff!

This book rocks

Excellent Read!!

Five Stars

Good :)

Incident Handlers perfect companion

Amazing tool for any InfoSec first responder. Perfect complement to the RTFM (red team field manual) as a professional. Short/ clean to the point, which is what you need when you are in a fight.

One of three reference materials I take with me everywhere.

Well written and a great guide for IR related tools and tips.

Five Stars

Perfect reference book

I didn't even know I wanted this, now I know...

Fantastic, great information. A must have for any jump bag!

Five Stars - Version 2 update very nice

Solid info, brief and informative, wide coverage on incident issues. Bought a second copy recently (gave away #1), have read through it, and the update does improve wording, fixes the few spelling errors someone complained about in V1, and has great packet header charts in the back. Got my copy autographed at a SANS conference to boot! I hear there are more titles in the series planned with a few underway.

Five Stars

A very handy little book with checklists and command examples for incident response.

Five Stars

A great title for the IRers!

If you need it, the analog world might be the only safe place around

Get a printed copy of this book. Because if you need it, the analog world might be the only safe place around. Jokes apart, I appreciated the straightforward style; seems that a script tells more than thousands of words.

Five Stars

Great book.

Great Resource to Have on hands for Security Analysts

Great Resource to Have on hands for Security Analysts. I have been using many of the techniques described in this book over the past few years but this book expanded on that knowledge a bit more than I was used to. It's great because it has all of the most common things one would typically run into on their day-to-day job as a security analyst. Not completely comprehensive but that's not the purpose of this book.

Good reference manual

This is a good reference manual for those interested in how the other side approaches network compromises. Good reference for knowing the opposition if you're interested in hacking principles.

Five Stars

I don't leave home without it.

Great book - Must Have!

Great guide for beginners and vets alike!

Five Stars

Great reference book!

maybe, maybe not.

TBH I think this book was probably just written to try and make money from to the hype of the "RTFM" book. I guess its OK but if you are looking for something to learn to blue team go get some certs, this book will not help you to become a "blue team"er.

Practical and essential.

I can't think of any other resources with the kind of perspective this book offers. This book talks about security relative to an office environment, as if you had an expert right next to you guiding you with practical steps for analysis.

Five Stars

So many great things in the book.

A little basic, had hoped for more...

This book is okay. It's an interesting compilation of cheat sheets and notes on how to use some basic tools. It's a neat book to thumb through, but I didn't really sense I could use it for "reference". I was hoping for a little more out of this book. It's clear it's meant to complement the RTFM (Red Team Field Manual), but aside from the "cheat-sheet" feel, I don't know that I would keep this at my desk for use in investigating incidents. Maybe for the guys who are new to the field? There are a lot of books available for "red teams" and penetration testers. It's good to see new books aimed at "blue teams" at all levels.

Five Stars

Very Good book. Great reference guide to keep close

Great

Exceeded my expectations.

Five Stars

Awesome book! fast delivery!

Unfortunately this is not *quite* the book an aspiring penetration tester would find useful.

I have yet to really work through this book but it looks very promising with the sheer amount of information and procedures. Unfortunately this is not *quite* the book an aspiring penetration tester would find useful.

Go Blue Team!

Don, Your books have been a tremendous tool for me and the teams I’ve led and I can’t thank you enough! Both Blue Team books are mandatory reading on my teams! By putting such great material all in one (now two) places your propelling the rest of us forward further and faster allowing us to stand on the shoulders of giants (you)! Go Blue Team! - Mark

Blue Team Pocket guide fo sho

I ordered this book because one of my colleagues on the Blue team had it and it looked interesting, I just started reading this book and I believe it'll be a great help!

Great book

Nice companion to the RTFM. I have been in INFOSEC for a while and I found most of the book to be somewhat generic. My feelings may not apply to everyone else though. There seems to be an idea out there that everyone in INFOSEC sits around grepping Snort logs and/or TCP dumps; this simply is not the case. As an incident first responder the job is fairly straight forward: isolate and collect the logs. Everyone has their own methods I guess. Some OS'es require you leave the system connected before collecting logs this book does not cover that aspect. Not everyone can afford a SANS course so in that respect this condensed field guide is a plus+. Simply put; you cannot afford to not have this book. A must buy.

Good

Good reference for assessment/ forensics/ recovery. Not all inclusive, and not a beginner/ small business reference

Don makes it easy to find the most pertinent methods and tools to ...

If you are responsible for defending your castle, you need to add this book to your high-tech "bug-out" bag. Don makes it easy to find the most pertinent methods and tools to assist with your Incident Response tasks. If your like me, and not just strictly dedicated to corporate IR duty, this will be your bible!! Brian Redick KTH Parts Industries, Inc.

Double impressivenesses

First, the book is very handy and to the point. Sec

Four Stars

Great book, blue team's version of the RTFM, but better.

Buy this

Great field manual for incident response and forensics professions. Carry size. Great checklists. Buy it

Good stuff. Just need to be proactive and update ...

Use it all the time. Good stuff. Just need to be proactive and update it every 2-3 yrs.

Awesome book for the travel bag for incident response

Awesome book for the travel bag for incident response. Also tells you what else should be in your travel bag ;) priceless.

Great reference material!

This book has some pretty good reference material for anyone responsible for InfoSec! There are a few typos here and there but, don't let those small insignificant errors deter you from purchasing this book. After reading through it, I convinced management to purchase a copy for everone on our InfoSec team.

Four Stars

great collection of useful commands and tools for incident response.

Insightful book. Processes are the 1st thing any organization ...

Insightful book. Processes are the 1st thing any organization needs to establish for a successful and consistent mitigation strategy.

Five Stars

Good to have with you at all time in you are in a CERT

Great!

Has different information than other books I have.

Excellent !!

Excellent !! MUST BUY !!!

Four Stars

Excellent book for guidance to incident response!

Cyber Necessity.

good book to have on hand. I use it to show network engineers how they are wrong.

Five Stars

perfect

Tech guy seems to enjoy this stuff

This was a gift. Tech guy seems to enjoy this stuff!

Five Stars

best read i have had in a while.

A must read for those in network and security

This was much better than I was expecting. A lot of it was what I would expect to see/read, but there was quite a bit that was really eye opening. I definite recommend for those responsible for network and security!

Five Stars

A useful gathering of many different kinds of info

Dons book is excellent! I learnt new things on each pages

Dons book is excellent ! I learnt new things on each pages

Cool book really.

Cool book really.

Five Stars

Great book!

I haven't really gotten into this yet, but from ...

I haven't really gotten into this yet, but from what I have skimmed, I believe it will provide some valuable information.

A must have for any tech

Great reading and a great supplement for the RTFM

Great book! Lots of insights in threat management and ...

Great book! Lots of insights in threat management and processes. I received this book right on time!

at $15 this is still a good deal but the average reader will have to do ...

Riddled with typos and mistakes in English, a weird layout for a book, and it's poorly typed and formatted. This is indeed a very "condensed field guide" -- more of a checklist actually -- so don't expect much explanation. Too much jargon that many may not understand. Okay, at $15 this is still a good deal but the average reader will have to do a lot of research to learn much.

this is a great book and I recommended to everybody

congrats... this is a great book and I recommended to everybody..

Good resource.

This is a good read. Even if you don't do IR, its worth your time.

They go together very well with tons of useful info.

Have the Red Team Handbook, as well. They go together very well with tons of useful info.

Don't buy this edition! Wait for one with better editing.

In the acknowledgements the author boasts of getting his 'money's worth' from his editor. I'm only into the first 15 pages or so and finding edit problems such as: Pg 9 "...internal vs external and network constancy". Likely meant to be "consistency".? Then Pg 12 " Collet network logs, ..." and "System or network segment may isolation may be necessary" Calling these out may seem picking knits but poor editing breaks the flow of concentration and the reader's mind must attempt to edit on the fly. That said through 15 pages I think this will make a good reference book and look forward to implementing some of the author's idea.

Four Stars

Real thing.

Four Stars

Excellent approach to incident response and a good book to keep in your IR kit.

Two Stars

Great for looking up codes

A must have for all security professionals

I recently purchased four incident handling books and one of them was the Blue Team Handbook. The other three books were much larger in volume but this handbook provided so much applicable content in such a condensed fashion that I'm not sure I needed to purchase the other three. This book would be great for both beginners or seasoned professionals. At this point I've bought a copy of the Blue Team Handbook for every security team member at my organization. Thank you Don Murdoch for putting this handbook together. I highly encourage all security professionals whether red team or blue team to purchase this book.

Not as expected

The book does not provide complete coverage for the topic of incident response

Three Stars

More technical than I wanted.

Blue Team Handbook; technical review

A steal at $15 - Must Have for Incidents, Admins, InfoSec This is a detailed review of the Blue Team Handbook Incident Response Edition. The book is organized in 35 major topics, each one very focused on a particular topic relating to the cyber security incident response process. For example, the “Using Snort” section has a discussion, practical examples, and real world command line usage of the tool. Sections have varying degree of detail – but they all include advice from a clear expert who has done the job. Two things that are nice. First, the book is well edited, has very good sentences, and no glaring spelling mistakes you would expect from a first edition self-published title. Second, at the end of nearly each section, there’s a tag line which advises how the topic is used for incident response. From beginning to end: The book starts with some ideas borrowed from the military – fog of war, etc. Good advice. Next there is an in depth, and practical, treatment of the incident response process, with illustrations. After that, the author provides insightful guidance on reporting through two different templates – one which follows the IR process previously described, and one from the commercial sector. These section both give spot on advice. There is a pretty clear outline of the attack process. This section doesn’t have a lot of depth; it does have a good overview to help an IR person understand how they will be assaulted, in keeping with the IR focus (not pen test focus). There is advice on using GPG, which would likely work well in the academic space. The netcat and crypt cat discussions tell you how to use these tools nicely – and there are some funny pictures for humor. The automated tools info doesn’t have a lot of “follow up usage” depth – but it does have solid advice, and does tell you how to preserve data for later analysis. Also in keeping with “incident response”. The volatile data collection sections (Windows, Linux) have lots of examples organized along the volatility order. One thing missing is making a disk image of RAID or server type systems. The “network device”, “network analysis”, and “suspicious traffic patterns” sections are great. This is where the book really shines. You can tell this author has “been there, done that” and preserved lots of useful information for the reader.

I loved this book

I loved this book. For the price, this is a must have book for anyone who works within info sec. However I must add one item. This book is for people who have been in the field of info sec for a while. At a minimum please at-least have the basic understanding of Security+. Some of the concepts within this book are for advance IT Security personnel. Overall a great book to have for review. If you planning on taking your CISSP, this would be a good book to take a quick glance.

One Star

Useless

Love it

Amazing

Five Stars

Awesome

This book is better suited for managers than 'coal face' people

This book is better suited for managers than 'coal face' people. It talks about incident response at quite a high level and doesn't get into the weeds enough. When you compare this to the Red Team Field Manual you will notice they cannot be compared, which is quite sad. If you need a reference book to do your job, use the RTFM, or The Way of the Packet this is a book you give to your boss when s/he asks you to explain your job.

Great reference book

Perfect to keep in your desk draw and whip out when needed, hugely helpful book to have during an incident and to keep around for reference. I would also recommend the following book

Five Stars

Price and shipping is good. The book doesn't need comments. :)

A must read

Great book for the beginner, which most of us are. We know it all, this tells us to think again. Recommended for my year 1 undergraduate forensic computing students.

Four Stars

An excellent introduction to cyber security incident response.

Handy to have a quick reference in you pocket

Excellent quick lecture. For the price it cannot be wrong.

It's good.

Good for commercial use.

Amazing

Outstanding and very useful

Five Stars

Excellent book

Five Stars

The best ratio of useful information to padding and waffle of pretty much any infosec book I've read.

Great

Great book

Five Stars

Great playbook for intrusion response. Recommended to any network admin.

Four Stars

Very good for professionals working in incident response and information security in general.

Four Stars

Handy handbook to have a hand!

Love this book

Love this book, helpful to have on hand.

Ottimo libro sulla sicurezza informatica

Questo libro ha lo scopo di fornire un approccio rapido verso la difesa da eventuali attacchi informatici. Offre diversispunti per mettere insiemeuna procedura per definire/catalogare l'incidente fino ad offrire comandi e software per scoprire chi, come e quando è riuscito a creare una breccia nel sistema. Sono ancora ai primi capitoli, ma giá da lì ho scoperto alcune vulnerabilità di cui non ero a conoscenza. Con poche direttive aggiunte ad apache, ho un sistema più sicuro. Davvero, gli spunti e gli strumenti per analizzare la propria infrastruttura sono molti. Più lo leggo, più mi appassiono al versante "sicurezza". Consigliato a chi gestisce server e reti aziendali. Essendo un libriccino veloce, non si può dire di non avere tempo per leggerlo!

As the name suggests, a condensed field guide

This book is quite good. Condensed commands and references to what needs to be looked at from an Incident Response perspective. I would highly recommend this to anyone willing to add to their knowledge. Please be aware, this book is not for learning Incident Response, but for bring a structure to how you handle these incidents/cases.

Libro bastante interesante

Tiene muy buen material, tanto de ataque como de defensa. Inclusive templates de documentos como por ejemplo contrato de pentesting. Me ha gustado, además, todo con explicación no sólo con los comandos escupidos. Libro recomendado. Lástima que no estaba en perfecto estado el libro, las esquinas algo dobladas, aunque el libro estaba totalmente nuevo.

Ottimo

Ritengo che questo libro sia un MUST, mi trovo spesso a sfogliarlo per rivedere la sintassi di alcuni comandi. Naturalmente estremamente utile nella gestione degli incidenti di sicurezza. Lo consiglio, vista anche l'ottimo prezzo.

Useful for anyone interested on defense

It can be compare to a guide, a recipe book that has to be at hand when you face, the hard work of forensics and basic security. We need procedures that some how warranty a minimum of healthy systems, and bring back system to work. Easy to read, good in content.

Buena chuleta de apuntes

Le falta algo de didáctica, pero está bien. Muestra una buena colección de apuntes diversos. Se parece bastante a las chuletas que he ido acumulando con el tiempo.

ble teaam

preso per sfizio, interessanti spunti di riflessione circa le tecniche di analisi e ricerca in apparati elettronici da leggere con calma interessante

Istruzioni per contro reazione verso attacchi web

Ottimo libro ma che non fa per chi è un beginner in queste tematiche. Scritto in inglese, diventa difficile per chi non ha le basi inerenti le tecniche di reazione da attacchi wbe per siti e cloud

Ottimo Acquisto

E' un manuale quasi tascabile, molto comodo durante i viaggi o per una consultazione veloce. Tratta molti argomenti dando idee su quali approfondire. Ottimo rapporto qualità-prezzo.

Ottimo libro

ottimo libro per chi vuole sempre avere a portata di mano indicazioni sulla gestione degli incidenti. Condensa in un unico manuale i vari mitre, nist enisa.

Not worth money

Not useful.. it seems that the writer has tried to publish a book based on his notes of commands put some text around...not worth buying..

Five Stars

Cool beans

Cool

Cool

Buen libro

Buen libro

Everything OK

Everything OK

Highly recommended.

Very handy, straight to the point and very direct. Highly recommended.

Trending Books