Art of attack : attacker mindset for security professionals.
The book shows you the laws of the mindset and the techniques attackers use, from persistence to start with the end strategies and non-linear thinking. --
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
[Place of publication not identified] :
John Wiley & Sons,
2021.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- About the Author
- Acknowledgments
- Contents
- Introduction
- Who Is This Book For?
- What This Book Covers
- Part I The Attacker Mindset
- Chapter 1 What Is the Attacker Mindset?
- Using the Mindset
- The Attacker and the Mindset
- AMs Is a Needed Set of Skills
- A Quick Note on Scope
- Summary
- Key Message
- Chapter 2 Offensive vs. Defensive Attacker Mindset
- The Offensive Attacker Mindset
- Comfort and Risk
- Planning Pressure and Mental Agility
- Emergency Conditioning
- Defensive Attacker Mindset
- Consistency and Regulation
- Anxiety Control
- Recovery, Distraction, and Maintenance
- OAMs and DAMs Come Together
- Summary
- Key Message
- Chapter 3 The Attacker Mindset Framework
- Development
- Phase 1
- Phase 2
- Application
- Preloading
- "Right Time, Right Place" Preload
- Ethics
- Intellectual Ethics
- Reactionary Ethics
- Social Engineering and Security
- Social Engineering vs. AMs
- Summary
- Key Message
- Part II The Laws and Skills
- Chapter 4 The Laws
- Law 1: Start with the End in Mind
- End to Start Questions
- Robbing a Bank
- Bringing It All together
- The Start of the End
- Clarity
- EfficiencyWhen you begin
- The Objective
- How to Begin with the End in Mind
- Law 2: Gather, Weaponize, and Leverage Information
- Law 3: Never Break Pretext
- Law 4: Every Move Made Benefits the Objective
- Summary
- Key Message
- Chapter 5 Curiosity, Persistence, and Agility
- Curiosity
- The Exercise: Part 1
- The Exercise: Part 2
- Persistence
- Skills and Common Sense
- Professional Common Sense
- Summary
- Key Message
- Chapter 6 Information Processing: Observation and Thinking Techniques
- Your Brain vs. Your Observation
- Observation vs. Heuristics
- Heuristics
- Behold Linda
- Observation vs. Intuition
- Using Reasoning and Logic
- Observing People
- Observation Exercise
- AMs and Observation
- Tying It All Together
- Critical and Nonlinear Thinking
- Vector vs. Arc
- Education and Critical Thinking
- Workplace Critical Thinking
- Critical Thinking and Other Psychological Constructs
- Critical Thinking Skills
- Nonlinear Thinking
- Tying Them Together
- Summary
- Key Message
- Chapter 7 Information Processing in Practice
- Reconnaissance
- Recon: Passive
- Recon: Active
- OSINT
- OSINT Over the Years
- Intel Types
- Alternative Data in OSINT
- Signal vs. Noise
- Weaponizing of Information
- Tying Back to the Objective
- Summary
- Key Message
- Part III Tools and Anatomy
- Chapter 8 Attack Strategy
- Attacks in Action
- Strategic Environment
- The Necessity of Engagement and Winning
- The Attack Surface
- Vulnerabilities
- AMs Applied to the Attack Vectors
- Phishing
- Mass Phish
- Spearphish
- Whaling
- Vishing
- Smishing/Smshing
- Impersonation
- Physical
- Back to the Manhattan Bank
- Summary
- Key Message
- Chapter 9 Psychology in Attacks