In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations vulnerable and provides noteworthy empirical evidence. You'll learn a proven APT Hacker Methodology for systematically targeting and infiltrating an organization and its IT systems. A unique, five-phased tactical approach to APT hacking is presented with real-world examples and hands-on techniques you can use immediately to execute very effective attacks.
Review empirical data from actual attacks conducted by unsophisticated and elite APT hackers alike
Learn the APT Hacker Methodology--a systematic approach designed to ensure success, avoid failures, and minimize the risk of being caught
Perform in-depth reconnaissance to build a comprehensive understanding of the target
Obtain non-technical data about the target, including open source, human, financial, and geographical intelligence
Use social engineering to compromise a specific system, application, or workstation
Identify and attack wireless networks and wireless client devices
Spearphish with hardware-based Trojan devices
Physically infiltrate target facilities to obtain access to assets and compromise digital lily pads
Tyler Wrightson, CISSP, CCSP, CCNA, CCDA, MCSE, is the founder and president of Leet Systems, which provides offensive security services such as penetration testing and red teaming. He is the author of Wireless Network Security: A Beginner's Guide. Follow Tyler's security blog at http://blog.leetsys.com.
Keywords: ADVANCED PERSISTENT THREATS, APT, HACK, HACKING, SECURITY, TYLER WRIGHTSON, OFFENSIVE, IT, NETWORK, PENETRATION TEST, ATTACK, EMPIRICAL DATA, RECONNAISSANCE, SOCIAL ENGINEERING, PHYSICAL SECURITY, HARDWARE, MOBILE, THREAT, BACKDOOR, DEFENSE, LEET SYSTEMS, FRIGDO.COM, INTEGRALIS, WIRELESS NETWORK SECURITY A BEGINNER'S GUIDE, HACKING EXPOSED, HACKING EXPOSED WEB 2.0, HACKING EXPOSED VOIP, HACKING EXPOSED WINDOWS, HACKING EXPOSED WEB APPLICATIONS, HACKING EXPOSED CISCO NETWORKS, GRAY HAT HACKING, HACKING EXPOSED WIRELESS, HACKING EXPOSED COMPUTER FORENSICS, 19 DEADLY SINS OF SOFTWARE SECURITY, 24 DEADLY SINS OF SOFTWARE SECURITY, CCNA CISCO CERTIFIED NETWORK ASSOCIATE STUDY GUIDE, CCENT CISCO CERTIFIED ENTRY NETWORKING TECHNICIAN STUDY GUIDE, CCNA CISCO CERTIFIED NETWORK ASSOCIATE WIRELESS STUDY GUIDE, CISSP ALL-IN-ONE EXAM GUIDE, MOBILE APPLICATION SECURITY, HACKING EXPOSED MALWARE AND ROOTKITS, HACKING EXPOSED COMPUTER FORENSICS, HACKING EXPOSED VIRTUALIZATION & CLOUD COMPUTING, IT SECURITY METRICS, SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) IMPLEMENTATION, IT AUDITING, CISSP BOXED SET, CISA CERTIFIED INFORMATION SYSTEMS AUDITOR ALL-IN-ONE EXAM GUIDE, MIKE MEYERS' COMPTIA SECURITY+ CERTIFICATION PASSPORT, SECURITY+ ALL-IN-ONE EXAM GUIDE, COMPTIA A+ CERTIFICATION ALL-IN-ONE EXAM GUIDE, CCNA CISCO CERTIFIED NETWORK ASSOCIATE SECURITY STUDY GUIDE, CWSP CERTIFIED WIRELESS SECURITY PROFESSIONAL OFFICIAL STUDY GUIDE, CWNA CERTIFIED WIRELESS NETWORK ADMINISTRATOR & CWSP CERTIFIED WIRELESS SECURITY PROFESSIONAL ALL-IN-ONE EXAM GUIDE, CTS CERTIFIED TECHNOLOGY SPECIALIST EXAM GUIDE, PRINCIPLES OF COMPUTER SECURITY COMPTIA SECURITY+ AND BEYOND LAB MANUAL, PRINCIPLES OF COMPUTER SECURITY, COMPTIA SECURITY+ AND BEYOND, COMPTIA A+ CERTIFICATION BOXED SET