Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. He discusses the strategic issues that make organizations vulnerable and provides noteworthy evidence. Readers will learn a proven APT Hacker Methodology for targeting and infiltrating an organization and its IT systems. Coverage includes: a review of empirical data from actual attacks conducted by unsophisticated and elite APT hackers
APT Hacker Methodology
in-depth reconnaissance to build a comprehensive understanding of the target
non-technical data about the target, including open source, human, financial, and geographical intelligence
use of social engineering to compromise a specific system, application, or workstation
identification and attack of wireless networks and wireless client devices
Spearphish with hardware-based Trojan devices
and infiltrating target facilities to obtain access to assets and compromise digital lily pads. -- Edited summary from book.