Cargando…

Art of attack : attacker mindset for security professionals.

The book shows you the laws of the mindset and the techniques attackers use, from persistence to start with the end strategies and non-linear thinking. --

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Reynolds, Maxie (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : John Wiley & Sons, 2021.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright Page
  • About the Author
  • Acknowledgments
  • Contents
  • Introduction
  • Who Is This Book For?
  • What This Book Covers
  • Part I The Attacker Mindset
  • Chapter 1 What Is the Attacker Mindset?
  • Using the Mindset
  • The Attacker and the Mindset
  • AMs Is a Needed Set of Skills
  • A Quick Note on Scope
  • Summary
  • Key Message
  • Chapter 2 Offensive vs. Defensive Attacker Mindset
  • The Offensive Attacker Mindset
  • Comfort and Risk
  • Planning Pressure and Mental Agility
  • Emergency Conditioning
  • Defensive Attacker Mindset
  • Consistency and Regulation
  • Anxiety Control
  • Recovery, Distraction, and Maintenance
  • OAMs and DAMs Come Together
  • Summary
  • Key Message
  • Chapter 3 The Attacker Mindset Framework
  • Development
  • Phase 1
  • Phase 2
  • Application
  • Preloading
  • "Right Time, Right Place" Preload
  • Ethics
  • Intellectual Ethics
  • Reactionary Ethics
  • Social Engineering and Security
  • Social Engineering vs. AMs
  • Summary
  • Key Message
  • Part II The Laws and Skills
  • Chapter 4 The Laws
  • Law 1: Start with the End in Mind
  • End to Start Questions
  • Robbing a Bank
  • Bringing It All together
  • The Start of the End
  • Clarity
  • EfficiencyWhen you begin
  • The Objective
  • How to Begin with the End in Mind
  • Law 2: Gather, Weaponize, and Leverage Information
  • Law 3: Never Break Pretext
  • Law 4: Every Move Made Benefits the Objective
  • Summary
  • Key Message
  • Chapter 5 Curiosity, Persistence, and Agility
  • Curiosity
  • The Exercise: Part 1
  • The Exercise: Part 2
  • Persistence
  • Skills and Common Sense
  • Professional Common Sense
  • Summary
  • Key Message
  • Chapter 6 Information Processing: Observation and Thinking Techniques
  • Your Brain vs. Your Observation
  • Observation vs. Heuristics
  • Heuristics
  • Behold Linda
  • Observation vs. Intuition
  • Using Reasoning and Logic
  • Observing People
  • Observation Exercise
  • AMs and Observation
  • Tying It All Together
  • Critical and Nonlinear Thinking
  • Vector vs. Arc
  • Education and Critical Thinking
  • Workplace Critical Thinking
  • Critical Thinking and Other Psychological Constructs
  • Critical Thinking Skills
  • Nonlinear Thinking
  • Tying Them Together
  • Summary
  • Key Message
  • Chapter 7 Information Processing in Practice
  • Reconnaissance
  • Recon: Passive
  • Recon: Active
  • OSINT
  • OSINT Over the Years
  • Intel Types
  • Alternative Data in OSINT
  • Signal vs. Noise
  • Weaponizing of Information
  • Tying Back to the Objective
  • Summary
  • Key Message
  • Part III Tools and Anatomy
  • Chapter 8 Attack Strategy
  • Attacks in Action
  • Strategic Environment
  • The Necessity of Engagement and Winning
  • The Attack Surface
  • Vulnerabilities
  • AMs Applied to the Attack Vectors
  • Phishing
  • Mass Phish
  • Spearphish
  • Whaling
  • Vishing
  • Smishing/Smshing
  • Impersonation
  • Physical
  • Back to the Manhattan Bank
  • Summary
  • Key Message
  • Chapter 9 Psychology in Attacks