About the Author |
|
v | |
Acknowledgments |
|
vii | |
Introduction |
|
xv | |
|
PART I THE ATTACKER MINDSET |
|
|
1 | (62) |
|
Chapter 1 What Is The Attacker Mindset? |
|
|
3 | (14) |
|
|
6 | (3) |
|
The Attacker and the Mindset |
|
|
9 | (2) |
|
AMs Is a Needed Set of Skills |
|
|
11 | (5) |
|
|
13 | (3) |
|
|
16 | (1) |
|
|
16 | (1) |
|
Chapter 2 Offensive Vs. Defensive Attacker Mindset |
|
|
17 | (20) |
|
The Offensive Attacker Mindset |
|
|
20 | (11) |
|
|
22 | (1) |
|
Planning Pressure and Mental Agility |
|
|
23 | (3) |
|
|
26 | (5) |
|
Defensive Attacker Mindset |
|
|
31 | (4) |
|
Consistency and Regulation |
|
|
31 | (1) |
|
|
32 | (2) |
|
Recovery, Distraction, and Maintenance |
|
|
34 | (1) |
|
OAMs and DAMs Come Together |
|
|
35 | (1) |
|
|
35 | (2) |
|
|
36 | (1) |
|
Chapter 3 The Attacker Mindset Framework |
|
|
37 | (26) |
|
|
39 | (13) |
|
|
43 | (4) |
|
|
47 | (1) |
|
|
48 | (3) |
|
|
51 | (1) |
|
"Right Time, Right Place" Preload |
|
|
51 | (1) |
|
|
52 | (5) |
|
|
53 | (1) |
|
|
53 | (4) |
|
Social Engineering and Security |
|
|
57 | (3) |
|
Social Engineering vs. AMs |
|
|
59 | (1) |
|
|
60 | (3) |
|
|
60 | (3) |
|
PART II THE LAWS AND SKILLS |
|
|
63 | (108) |
|
|
65 | (18) |
|
Law 1 Start with the End in Mind |
|
|
65 | (10) |
|
|
66 | (2) |
|
|
68 | (2) |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
72 | (1) |
|
|
72 | (1) |
|
How to Begin with the End in Mind |
|
|
73 | (2) |
|
Law 2 Gather, Weaponize, and Leverage Information |
|
|
75 | (2) |
|
Law 3 Never Break Pretext |
|
|
77 | (3) |
|
Law 4 Every Move Made Benefits the Objective |
|
|
80 | (1) |
|
|
81 | (2) |
|
|
82 | (1) |
|
Chapter 5 Curiosity, Persistence, And Agility |
|
|
83 | (16) |
|
|
86 | (1) |
|
|
87 | (2) |
|
|
89 | (3) |
|
|
92 | (3) |
|
|
95 | (3) |
|
Professional Common Sense |
|
|
95 | (3) |
|
|
98 | (1) |
|
|
98 | (1) |
|
Chapter 6 Information Processing: Observation And Thinking Techniques |
|
|
99 | (36) |
|
Your Brain vs. Your Observation |
|
|
102 | (5) |
|
Observation vs. Heuristics |
|
|
107 | (2) |
|
|
107 | (1) |
|
|
108 | (1) |
|
Observation vs. Intuition |
|
|
109 | (5) |
|
Using Reasoning and Logic |
|
|
112 | (2) |
|
|
114 | (2) |
|
|
116 | (6) |
|
|
122 | (1) |
|
|
123 | (1) |
|
Critical and Nonlinear Thinking |
|
|
124 | (3) |
|
|
127 | (1) |
|
Education and Critical Thinking |
|
|
128 | (1) |
|
Workplace Critical Thinking |
|
|
128 | (1) |
|
Critical Thinking and Other Psychological Constructs |
|
|
129 | (2) |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
133 | (2) |
|
|
134 | (1) |
|
Chapter 7 Information Processing In Practice |
|
|
135 | (36) |
|
|
136 | (9) |
|
|
145 | (4) |
|
|
149 | (1) |
|
|
150 | (5) |
|
|
150 | (3) |
|
|
153 | (1) |
|
Alternative Data in OSINT |
|
|
154 | (1) |
|
|
155 | (15) |
|
Weaponizing of Information |
|
|
158 | (2) |
|
Tying Back to the Objective |
|
|
160 | (10) |
|
|
170 | (1) |
|
|
170 | (1) |
|
PART III TOOLS AND ANATOMY |
|
|
171 | (70) |
|
Chapter 8 Attack Strategy |
|
|
173 | (32) |
|
|
175 | (2) |
|
|
177 | (2) |
|
The Necessity of Engagement and Winning |
|
|
179 | (4) |
|
|
183 | (1) |
|
|
183 | (1) |
|
AMs Applied to the Attack Vectors |
|
|
184 | (19) |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
187 | (3) |
|
|
190 | (5) |
|
|
195 | (1) |
|
|
196 | (3) |
|
|
199 | (1) |
|
Back to the Manhattan Bank |
|
|
200 | (3) |
|
|
203 | (2) |
|
|
203 | (2) |
|
Chapter 9 Psychology In Attacks |
|
|
205 | (36) |
|
Setting The Scene: Why Psychology Matters |
|
|
205 | (5) |
|
Ego Suspension, Humility & Asking for Help |
|
|
210 | (7) |
|
|
215 | (1) |
|
|
216 | (1) |
|
Introducing the Target-Attacker Window Model |
|
|
217 | (4) |
|
|
218 | (3) |
|
|
221 | (12) |
|
|
225 | (3) |
|
Confirmation Bias and Motivated Reasoning |
|
|
228 | (3) |
|
|
231 | (2) |
|
|
233 | (3) |
|
|
236 | (3) |
|
|
239 | (2) |
|
|
239 | (2) |
|
|
241 | (32) |
|
Chapter 10 Staying Protected---The Individual |
|
|
243 | (14) |
|
Attacker Mindset for Ordinary People |
|
|
243 | (3) |
|
|
246 | (4) |
|
|
250 | (2) |
|
Analyze Your Attack Surface |
|
|
252 | (4) |
|
|
256 | (1) |
|
|
256 | (1) |
|
Chapter 11 Staying Protected---The Business |
|
|
257 | (16) |
|
|
258 | (1) |
|
|
258 | (3) |
|
|
261 | (2) |
|
|
261 | (2) |
|
|
263 | (1) |
|
|
264 | (1) |
|
|
264 | (2) |
|
The Full Spectrum of Crises |
|
|
266 | (3) |
|
|
268 | (1) |
|
|
269 | (1) |
|
|
270 | (3) |
|
|
271 | (2) |
Index |
|
273 | |