Book description
Master the tactics and tools of the advanced persistent threat hacker
In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations vulnerable and provides noteworthy empirical evidence. You'll learn a proven APT Hacker Methodology for systematically targeting and infiltrating an organization and its IT systems. A unique, five-phased tactical approach to APT hacking is presented with real-world examples and hands-on techniques you can use immediately to execute very effective attacks.
- Review empirical data from actual attacks conducted by unsophisticated and elite APT hackers alike
- Learn the APT Hacker Methodology--a systematic approach designed to ensure success, avoid failures, and minimize the risk of being caught
- Perform in-depth reconnaissance to build a comprehensive understanding of the target
- Obtain non-technical data about the target, including open source, human, financial, and geographical intelligence
- Use social engineering to compromise a specific system, application, or workstation
- Identify and attack wireless networks and wireless client devices
- Spearphish with hardware-based Trojan devices
- Physically infiltrate target facilities to obtain access to assets and compromise digital lily pads
Table of contents
- Cover
- Title Page
- Copyright Page
- Dedication
- Contents at a Glance
- Contents
- Acknowledgments
- Introduction
- Chapter 1 Introduction
- Chapter 2 Empirical Data
- Chapter 3 APT Hacker Methodology
- Chapter 4 An APT Approach to Reconnaissance
- Chapter 5 Reconnaissance: Nontechnical Data
- Chapter 6 Spear Social Engineering
- Chapter 7 Phase III: Remote Targeting
- Chapter 8 Spear Phishing with Hardware Trojans
- Chapter 9 Physical Infiltration
- Chapter 10 APT Software Backdoors
- Index
Product information
- Title: Advanced Persistent Threat Hacking
- Author(s):
- Release date: December 2014
- Publisher(s): McGraw-Hill
- ISBN: 9780071828376
You might also like
book
Advanced Persistent Threat
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The …
article
From ChatGPT to HackGPT: Meeting the Cybersecurity Threat of Generative AI
Emerging generative AI technologies such as ChatGPT are putting new tools in the hands of hackers. …
book
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Know how to set up, defend, and attack computer networks with this revised and expanded second …
book
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin …