The Art of Attack. Maxie Reynolds
Читать онлайн книгу.Part IV: After AMs Chapter 10: Staying Protected—The Individual Attacker Mindset for Ordinary People Behavioral Security Amygdala Hijacking Analyze Your Attack Surface Summary Chapter 11: Staying Protected—The Business Testing and Red Teams The Complex Policy Antifragile The Full Spectrum of Crises Final Thoughts Summary
11 Index
List of Illustrations
1 Chapter 3Figure 3.1 Attacker Mindset Framework (AMsF)Figure 3.2 Finding No. 1: Lehman Brothers’s corporate addressFigure 3.3 Finding No. 3: Lehman Brothers’s building engineers and suppliersFigure 3.4 Find No. 1: SEC ALT numberFigure 3.5 Find No. 2: Ernst & Young LLP
2 Chapter 6Figure 6.1 Photo AFigure 6.2 Photo BFigure 6.3 Photo B zoomed inFigure 6.4 Photo C
3 Chapter 7Figure 7.1 First page of google search resultsFigure 7.2 Second page of Google search resultsFigure 7.3 First Twitter findFigure 7.4 Further information on TargetFigure 7.5 OSINT challenge example from social mediaFigure 7.6 Example of professional finding giving usable personal inforamtionFigure 7.7 Results of a simple searchFigure 7.8Figure 7.9 Buckets: Categorizing OSINT FindingsFigure 7.10 Determining the location of my target by photoFigure 7.11 List of churches in BerlinFigure 7.12 Result of Google Maps searchFigure 7.13 Figure 7.14 Two photos from an Asian cityFigure 7.15 Map showing satellite imageryFigure 7.16 Building matchFigure 7.17 Google Earth 3D view
Guide
9 Index
10 WILEY END USER LICENSE AGREEMENT
Pages
1 iii
2 iv
3 v
4 vi
5 vii
6 xv
7 xvi
8 xvii
9 xviii
10 xix
11 1
12 3
13 4
14 5
15 6
16 7
17 8
18 9
19 10
20 11
21 12
22 13
23 14
24 15
25 16
26 17
27 18
28 19
29 20