Description |
1 online resource (307 pages) |
Contents |
Cover -- Title Page -- Copyright Page -- About the Author -- Acknowledgments -- Contents -- Introduction -- Who Is This Book For? -- What This Book Covers -- Part I The Attacker Mindset -- Chapter 1 What Is the Attacker Mindset? -- Using the Mindset -- The Attacker and the Mindset -- AMs Is a Needed Set of Skills -- A Quick Note on Scope -- Summary -- Key Message -- Chapter 2 Offensive vs. Defensive Attacker Mindset -- The Offensive Attacker Mindset -- Comfort and Risk -- Planning Pressure and Mental Agility -- Emergency Conditioning -- Defensive Attacker Mindset -- Consistency and Regulation |
|
Anxiety Control -- Recovery, Distraction, and Maintenance -- OAMs and DAMs Come Together -- Summary -- Key Message -- Chapter 3 The Attacker Mindset Framework -- Development -- Phase 1 -- Phase 2 -- Application -- Preloading -- "Right Time, Right Place" Preload -- Ethics -- Intellectual Ethics -- Reactionary Ethics -- Social Engineering and Security -- Social Engineering vs. AMs -- Summary -- Key Message -- Part II The Laws and Skills -- Chapter 4 The Laws -- Law 1: Start with the End in Mind -- End to Start Questions -- Robbing a Bank -- Bringing It All together -- The Start of the End |
|
Clarity -- EfficiencyWhen you begin -- The Objective -- How to Begin with the End in Mind -- Law 2: Gather, Weaponize, and Leverage Information -- Law 3: Never Break Pretext -- Law 4: Every Move Made Benefits the Objective -- Summary -- Key Message -- Chapter 5 Curiosity, Persistence, and Agility -- Curiosity -- The Exercise: Part 1 -- The Exercise: Part 2 -- Persistence -- Skills and Common Sense -- Professional Common Sense -- Summary -- Key Message -- Chapter 6 Information Processing: Observation and Thinking Techniques -- Your Brain vs. Your Observation -- Observation vs. Heuristics |
|
Heuristics -- Behold Linda -- Observation vs. Intuition -- Using Reasoning and Logic -- Observing People -- Observation Exercise -- AMs and Observation -- Tying It All Together -- Critical and Nonlinear Thinking -- Vector vs. Arc -- Education and Critical Thinking -- Workplace Critical Thinking -- Critical Thinking and Other Psychological Constructs -- Critical Thinking Skills -- Nonlinear Thinking -- Tying Them Together -- Summary -- Key Message -- Chapter 7 Information Processing in Practice -- Reconnaissance -- Recon: Passive -- Recon: Active -- OSINT -- OSINT Over the Years -- Intel Types |
|
Alternative Data in OSINT -- Signal vs. Noise -- Weaponizing of Information -- Tying Back to the Objective -- Summary -- Key Message -- Part III Tools and Anatomy -- Chapter 8 Attack Strategy -- Attacks in Action -- Strategic Environment -- The Necessity of Engagement and Winning -- The Attack Surface -- Vulnerabilities -- AMs Applied to the Attack Vectors -- Phishing -- Mass Phish -- Spearphish -- Whaling -- Vishing -- Smishing/Smshing -- Impersonation -- Physical -- Back to the Manhattan Bank -- Summary -- Key Message -- Chapter 9 Psychology in Attacks |
Note |
Setting The Scene: Why Psychology Matters. |
Summary |
The book shows you the laws of the mindset and the techniques attackers use, from persistence to start with the end strategies and non-linear thinking. -- Edited summary from book. |
Subject |
Computer security.
|
|
Sécurité informatique. |
|
Computer security |
Other Form: |
Print version: Reynolds, Maxie. Art of Attack. Newark : John Wiley & Sons, Incorporated, ©2021 9781119805465 |
ISBN |
1119805473 |
|
9781119806288 (electronic bk.) |
|
1119806283 (electronic bk.) |
|
9781119805472 (electronic bk.) |
|
9781394177486 (electronic bk.) |
|
1394177488 (electronic bk.) |
Standard No. |
10.1002/9781394177486 doi |
|