LIMITED OFFER
Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code needed.
“InfoSec Career Hacking” starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security… Read more
LIMITED OFFER
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Acknowledgments
Author Dedication
Lead Author and Technical Editor
Contributing Authors
Technical Reviewer
Foreword Contributor
Foreword
Part I: Recon/Assessment
Chapter 1: The Targets—What I Want to Be When I Grow Up (or at Least Get Older)
Introduction
Understanding INFOSEC
Employment Opportunities
Defining the Jobs
Bringing Together the Skills
Advanced Skills
So Where Do I Match Up?
Checklist
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 2: Reconnaissance: Social Engineering for Profit
Introduction
Narrowing Your Choices
Digging for Information
Researching for Rewards
Making Contact
Checklist
Summary
Solutions Fast Track
Links to Sites
Mailing Lists
Frequently Asked Questions
Chapter 3: Enumerate: Determine What’s Out There
Introduction
What Should I Do First?
Is Education Important?
Certifications: Magic or Myth?
Getting Your Name Out There
Understanding Opportunities and Gaining Experience
Security Clearances
Summary
Solutions Fast Track
Links to Sites
Mailing Lists
Frequently Asked Questions
Chapter 4: First Strike: Basic Tactics for Successful Exploitation
Part II: Technical Skills
Chapter 5: The Laws of Security
Introduction
Knowing the Laws of Security
Client-Side Security Doesn’t Work
You Cannot Securely Exchange Encryption Keys without a Shared Piece of Information
Malicious Code Cannot Be 100 Percent Protected against
Any Malicious Code Can Be Completely Morphed to Bypass Signature Detection
Firewalls Cannot Protect You 100 Percent from Attack
Any IDS Can Be Evaded
Secret Cryptographic Algorithms Are Not Secure
If a Key Is Not Required, You Do Not Have Encryption—You Have Encoding
Passwords Cannot Be Securely Stored on the Client Unless There Is Another Password to Protect Them
In Order for a System to Begin to Be Considered Secure, It Must Undergo an Independent Security Audit
Security through Obscurity Does Not Work
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 6: No Place Like/home—Creating an Attack Lab
Chapter 7: Vulnerability Disclosure
Introduction
Vulnerability Disclosure and Cyber Adversaries
“Free For All”: Full Disclosure
Unfixed Vulnerability Attack Capability and Attack Inhibition Considerations
Probability of Success Given an Attempt
Probability of Detection Given an Attempt
“Symmetric” Full Disclosure
Responsible Restricted “Need to Know” Disclosure
Responsible, Partial Disclosure and Attack Inhibition Considerations
“Responsible” Full Disclosure
Responsible, Full Disclosure Capability and Attack Inhibition Considerations
Security Firm “Value Added” Disclosure Model
Value-Add Disclosure Model Capability and Attack Inhibition Considerations
Non-Disclosure
The Vulnerability Disclosure Pyramid Metric
Pyramid Metric Capability and Attack Inhibition
Pyramid Metric and Capability—A Composite Picture Pyramid
Comparison of Mean Inhibitor Object Element Values
The Disclosure Food Chain
Summary
Frequently Asked Questions
Chapter 8: Classes of Attack
Introduction
Identifying and Understanding the Classes of Attack
Identifying Methods of Testing for Vulnerabilities
Standard Research Techniques
Summary
Solutions Fast Track
Frequently Asked Questions
Part III: On the Job
Chapter 9: Don’t Trip the Sensors: Integrate and Imitate
Introduction
Hacking the System
Hacking the Network
Escalating Your Privileges
Managing Your Time
Checklist
Summary
Solutions Fast Track
Links to Sites
Mailing Lists
Frequently Asked Questions
Chapter 10: Vulnerability Remediation—Work Within the System
Introduction
Giving Back to the (Local) Community
Contributing to the INFOSEC Community
Upgrading Your Skills
Upgrading Your Workplace
Checklist
Summary
Solutions Fast Track
Links to Sites
Frequently Asked Questions
Chapter 11: Incident Response – Putting Out Fires Without Getting Burned
Amanda
Chapter 12: Rooting: Show Me the Money!
Introduction
Building Jumpstart InfoSec Services
Managing Hackers
Planning, Expanding, and Dominating
Summary
Solutions Fast Track
Links to Sites
Frequently Asked Questions
Index
CH
JL