Скачать книгу

-757d95a6427a">

      

      Table of Contents

      1  Cover

      2  Title Page

      3  Copyright

      4  About the Author

      5  Acknowledgments

      6  Introduction Who Is This Book For? What This Book Covers

      7  Part I: The Attacker Mindset Chapter 1: What Is the Attacker Mindset? Using the Mindset The Attacker and the Mindset AMs Is a Needed Set of Skills Summary Chapter 2: Offensive vs. Defensive Attacker Mindset The Offensive Attacker Mindset Defensive Attacker Mindset Summary Chapter 3: The Attacker Mindset Framework Development Ethics Social Engineering and Security Summary

      8  Part II: The Laws and Skills Chapter 4: The Laws Law 1: Start with the End in Mind Law 2: Gather, Weaponize, and Leverage Information Law 3: Never Break Pretext Law 4: Every Move Made Benefits the Objective Summary Chapter 5: Curiosity, Persistence, and Agility Curiosity The Exercise: Part 1 The Exercise: Part 2 Persistence Skills and Common Sense Summary Chapter 6: Information Processing: Observation and Thinking Techniques Your Brain vs. Your Observation Observation vs. Heuristics Observation vs. Intuition Observing People Observation Exercise AMs and Observation Tying It All Together Critical and Nonlinear Thinking Vector vs. Arc Education and Critical Thinking Workplace Critical Thinking Critical Thinking and Other Psychological Constructs Nonlinear Thinking Tying Them Together Summary Chapter 7: Information Processing in Practice Reconnaissance Recon: Passive Recon: Active OSINT Signal vs. Noise Summary

      9  Part III: Tools and Anatomy Chapter 8: Attack Strategy Attacks in Action Strategic Environment The Necessity of Engagement and Winning The Attack Surface AMs Applied to the Attack Vectors Summary Chapter 9: Psychology in Attacks Setting The Scene: Why Psychology Matters Ego Suspension, Humility & Asking for Help Introducing the Target‐Attacker Window Model Target Psychology Thin‐Slice Assessments Default to Truth Summary

Скачать книгу