1 Cover
2 Title Page The Art of Attack Attacker Mindset for Security Professionals Maxie Reynolds
3 Copyright
4 About the Author
5 Acknowledgments
6 Introduction Who Is This Book For? What This Book Covers
7 Part I: The Attacker Mindset Chapter 1: What Is the Attacker Mindset? Using the Mindset The Attacker and the Mindset AMs Is a Needed Set of Skills Summary Chapter 2: Offensive vs. Defensive Attacker Mindset The Offensive Attacker Mindset Defensive Attacker Mindset Summary Chapter 3: The Attacker Mindset Framework Development Ethics Social Engineering and Security Summary
8 Part II: The Laws and Skills Chapter 4: The Laws Law 1: Start with the End in Mind Law 2: Gather, Weaponize, and Leverage Information Law 3: Never Break Pretext Law 4: Every Move Made Benefits the Objective Summary Chapter 5: Curiosity, Persistence, and Agility Curiosity The Exercise: Part 1 The Exercise: Part 2 Persistence Skills and Common Sense Summary Chapter 6: Information Processing: Observation and Thinking Techniques Your Brain vs. Your Observation Observation vs. Heuristics Observation vs. Intuition Observing People Observation Exercise AMs and Observation Tying It All Together Critical and Nonlinear Thinking Vector vs. Arc Education and Critical Thinking Workplace Critical Thinking Critical Thinking and Other Psychological Constructs Nonlinear Thinking Tying Them Together Summary Chapter 7: Information Processing in Practice Reconnaissance Recon: Passive Recon: Active OSINT Signal vs. Noise Summary
9 Part III: Tools and Anatomy Chapter 8: Attack Strategy Attacks in Action Strategic Environment The Necessity of Engagement and Winning The Attack Surface AMs Applied to the Attack Vectors Summary Chapter 9: Psychology in Attacks Setting The Scene: Why Psychology Matters Ego Suspension, Humility & Asking for Help Introducing the Target‐Attacker Window Model Target Psychology Thin‐Slice Assessments Default to Truth Summary
10 Part IV: After AMs Chapter 10: Staying Protected—The IndividualAttacker Mindset for Ordinary People Behavioral Security Amygdala Hijacking Analyze Your Attack Surface Summary Chapter 11: Staying Protected—The Business Testing and Red Teams The Complex Policy Antifragile The Full Spectrum of Crises Final Thoughts Summary
11 Index
12 End User License Agreement
1 Chapter 3 Figure 3.1 Attacker Mindset Framework (AMsF) Figure 3.2 Finding No. 1: Lehman Brothers’s corporate address Figure 3.3 Finding No. 3: Lehman Brothers’s building engineers and suppliers Figure 3.4 Find No. 1: SEC ALT number Figure 3.5 Find No. 2: Ernst & Young LLP
2 Chapter 6Figure 6.1 Photo AFigure 6.2 Photo BFigure 6.3 Photo B zoomed inFigure 6.4 Photo C
3 Chapter 7Figure 7.1 First page of google search resultsFigure 7.2 Second page of Google search resultsFigure 7.3 First Twitter findFigure 7.4 Further information on TargetFigure 7.5 OSINT challenge example from social mediaFigure 7.6 Example of professional finding giving usable personal inforamtionFigure 7.7 Results of a simple searchFigure 7.8Figure 7.9 Buckets: Categorizing OSINT FindingsFigure 7.10 Determining the location of my target by photoFigure 7.11 List of churches in BerlinFigure 7.12 Result of Google Maps searchFigure 7.13 Figure 7.14 Two photos from an Asian cityFigure 7.15 Map showing satellite imageryFigure 7.16 Building matchFigure 7.17 Google Earth 3D view
1 Cover Page
2 Title Page The Art of Attack Attacker Mindset for Security Professionals Maxie Reynolds
3 Copyright
4 About the Author
5 Acknowledgments
6 Introduction
7 Table of Contents
8 Begin Reading
9 Index
10 WILEY END USER LICENSE AGREEMENT
1 iii
2 iv
3 v
4 vi
5 vii
6 xv
7 xvi
8 xvii
9 xviii
10 xix
11 1
12 3
13 4
14 5
15 6
16 7
17 8
18 9
19 10
20 11
21 12
22 13
23 14
24 15
25 16
26 17
27 18
28 19
29 20
30 21
31 22
32 23
33 24
34 25
35 26
36 27
37 28
38 29
39 30
40 31
41 32
42 33
43 34
44 35
45 36
46 37
47 38
48 39
49 40
50 41
51 42
52 43
53 44
54 45
55 46
56 47
57 48
58 49
59 50
60 51
61 52
62 53
63 54
64 55
65 56
66 57
67 58
68 59
69 60
70 61
71 63
72 65
73 66
74 67
75 68
76 69
77 70
78 71
79 72
80 73
81 74
82 75
83 76
84 77
85 78
86 79
87 80
88 81
89 82
90 83
91 84
92 85
93 86
94 87
95 88
96 89
97 90
98 91
99 92
100 93
101 94
102 95
103 96
104 97
105 98
106 99
107 100
108 101
109 102
110 103
111 104
112 105
113 106
114 107
115 108
116 109
117 110
118 111
119 112
120 113
121 114
122 115
123 116
124 117
125 118
126 119
127 120
128 121
129 122
130 123
131 124
132 125
133 126
134 127
135 128
136 129
137 130
138 131
139 132
140 133
141 134
142 135
143 136
144 137
145 138
146 139
147 140
148 141
149 142
150 143
151 144
152 145
153 146
154 147
155 148
156 149
157 150
158 151
159 152
160 153
161 154
162 155
163 156
164 157
165 158
166 159
167 160
168 161
169 162
170 163
171 164
172 165
173 166
174 167
175 168
176 169
177 170
178 171
179 173
180 174
181 175
182 176
183 177
184 178
185 179
186 180
187 181
188 182
189 183
190 184
191 185
192 186
193 187
194 188
195 189
196 190
197 191
198 192
199 193
200 194
201 195
202 196
203 197
204 198
205 199
206 200
207 201
208 202
209 203
210 205
211 206
212 207
213 208
214 209
215 210
216 211
217 212
218 213
219 214
220 215
221 216
222 217
223 218
224 219
225 220
226 221
227 222
228 223
229 224
230 225
231 226
232 227
233 228
234 229
235 230
236 231
237 232
238 233
239 234
240 235
241 236
242 237
243 238
244 239
245 241
246 243
247 244
248 245
249 246
250 247
251 248
252 249
253 250
254 251
255 252
256 253
257 254
258 255
259 256
260 257
261 258
262 259
263 260
264 261
265 262
266 263
267 264
268 265
269 266
270 267
271 268
272 269
273 270
274 271
275 273
276 274
277 275
278 276
279 277
280 278
281 279
282 280
283 281
284 282
285 283
286 284
287 285
The Art of Attack
Attacker Mindset for Security Professionals
Maxie Reynolds
Читать дальше