Creating, Developing, and Maintaining an Effective Penetration Testing Team
Buch, Englisch, 306 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 487 g
ISBN: 979-8-8688-0173-0
Verlag: Apress
The Business of Hacking is a one-of-a-kind book detailing the lessons the authors learned while building penetrating testing teams from the ground up, making them profitable, and constructing management principles that ensure team scalability. You will discover both the challenges you face as you develop your team of offensive security professionals and an understanding of how to overcome them. You will gain an understanding of the client’s requirements, how to meet them, and how to surpass them to provide clients with a uniquely professional experience.
The authors have spent combined decades working in various aspects of cybersecurity with a focus on offensive cybersecurity. Their experience spans military, government, and commercial industries with most of that time spent in senior leadership positions.
What you’ll learn
- How to handle and ongoing develop client relationships in a high end industry
- Team management and how the offensive security industry comes with its own unique challenges. Experience in other industries does not guarantee success in penetration testing.
- How to identify, understand, and over-deliver on client expectations.
- How to staff and develop talent within the team.
- Marketing opportunities and how to use the pentesting team as a wedge for upsell opportunities.
- The various structures of services available that they may present to their clients.
Who This Book Is For
This book is written for anyone curious who is interested in creating a penetration testing team or business. It is also relevant for anyone currently executing such a business and even for those simply participating in the business.
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Introduction
Chapter 1: Finding and Retaining Talent
The unique challenges of finding and retaining talented hackers
Advertising positions
Identifying talented individuals beyond their resumes
The improved interview processRetention through mission and collaboration
Chapter 2: Understanding Clients
The types of clients
Client point of view
Client requirements
Going beyond what a client thinks they want
Client relationship pitfalls
Chapter 3: Team Management
Time management
Operational management
Team climate
Transparent management practices
Experimentation
Chapter 4: Developing Hackers
Certifications and Training
Conferences
Development within the team
Development through challenge
Chapter 5: Engagement Management and Security
Do not degrade security
Information security
Communication security
Breaking an engagement down
The uses and limitations of operational checklists
Client interaction and communication
Chapter 6: Effective Web / Mobile Application Testing
Client goals
Scoping the assessment
Unique challenges of app testingSafety concerns
Authenticated vs unauthenticed
Source code
Ensuring an effective test
Chapter 7: Effective Testing in Cloud Environments
Client goals
Scoping the assessment
Unique challenges of cloud environment testing
AWS, Azure, and GCP
Ensuring an effective test
Reporting what matters
Chapter 8: Effective Network Testing
Client goals
Scoping the assessment
Unique challenges of network testing
Safety concerns
Stealth or the lack thereof
Taking network testing to the next level
Ensuring an effective test
Chapter 9: Hacking Acquisitions
Different acquisition scenarios
Evaluating risks unique to acquisition scenarios (standard, supply chain, etc)
Client goals
Unique challenges of acquisition testingPreventing an adversarial test
Chapter 10: Closing the Engagement
The importance of the report
How to make your reports look better than most
Handling “no finding” reports
How to not surprise the client
Outbrief format
Recommendations
Remediation testing
Follow up
Chapter 11: Adversary as a Service
Campaigns
Intelligence Creation
Adversarial Cost Benefit
Influence Study
Chapter 12: Scaling
Scaling operations
Scaling time managementScaling team management
Scaling tester development
Metrics tracking
Example
Chapter 13: The Wedge
Hacking as a wedgeHow to use the outbrief to upsell
Follow up services
Turning an on-time test into an ongoing relationship
Chapter 14: Regulated Sectors
Specific challenges of regulated sectors
HIPAA
Finance
Gov / RMF accredidation
FEDRAMP
Chapter 15: Practicality of cyber war
Legality Issues
Attribution IssuesOperational Constraints
Misconceptions
Chapter 16: the business of cyber war
Infrastructure
Exploits
Implants
Effects
Influence Operations
Chapter 17: new frontiers
Space systems
Attacking MLStrategic security
Resilience
Chapter 18: Hacking and the infinite game / cost benefit
Understanding game classification
Gamification
Game TheoryGames within games




