Holistic InfoSec For Web Developers, Fascicle 0: Physical and People
Holistic InfoSec For Web Developers, Fascicle 0: Physical and People
Creating and maintaining robust technical solutions that will resist attacks from your adversaries
About the Book
Homepage: https://f0.holisticinfosecforwebdevelopers.com
Contents: https://f0.holisticinfosecforwebdevelopers.com/toc.html
Discounts: If you would like a discount, please email me, letting me know how much you would be willing to pay. The less you pay, the more I may consult with you about your recommendations, direction, etc.
Authors Homepage: binarymist.io
Authors Other Books: https://binarymist.io/publication/kims-selected-publications/
Bundles that include this book
About the Contributors
Contributor
Some contributions to the People chapter. Especially around phishing countermeasures. Chris is the creator of Pond

Contributor
Some contributions to the Physical chapter

Editor

Technical Editor
Table of Contents
- Foreword
-
Preface
- Description
- Purpose
- Reason
- Acknowledgements
- Influences
- Introduction
-
Starting with the 30,000’ View
- 1. SSM Asset Identification
-
2. SSM Identify Risks
- Rating of Threats
- 3. SSM Countermeasures
- 4. SSM Risks that Solution Causes
- 5. SSM Costs and Trade-offs
-
2. 10,000’ View and Lower
- A 10,000’ View Scenario
-
3. Tooling Setup
-
Kali Linux
- What’s Included in Kali Linux
- Kali Linux Install
-
Tools I Use in Kali Linux requiring config, etc
-
Metasploit
- Useful metasploit commands
- metasploit meterpreter client commands
- Using the database and workspaces in metasploit
- BeEF
- Updating BurpSuite
-
Metasploit
-
Tools I Use That Need Adding to Kali Linux
- Terminator
- Discover Scripts
- SmbExec
- Gitrob
- CMSmap
- Veil Framework
- Password Lists
- Common User Passwords Profiler (cupp)
- Http Screenshot
- Psmsf
- Responder
- Custom Scripts from The Hacker Playbook 2
- BypassUAC
- NoSQLMap
- Spiderfoot
- OWASP SecLists
- Net-creds
- Unix-privesc-check
- LinEnum
- Chromium
- Chromium Extensions
- Iceweasel (FireFox with different Licensing) add-ons
-
Additional Hardware
-
TP-LINK TL-WN722N USB Wireless Adapter
- Wi-Fi Adapter:
- Useful commands:
- Reconnaissance:
- Provide USB privileges to guest:
- Provide USB recognition to guest:
- Blacklist Wi-Fi Module on Host:
- Test:
-
TP-LINK TL-WN722N USB Wireless Adapter
-
Windows
-
Tools I Use That Need Adding to Windows
- MinGW
- Hyperion
- psmsf
- Nishang
- PowerSploit
-
Tools I Use That Need Adding to Windows
-
Kali Linux
-
4. Process and Practises
-
Penetration Testing
-
Reconnaissance
- Reconnaissance Forms
- Passive
- Semi-Active
-
Active
- Netcat
- Nmap
-
Concealing NMap Source IP Address
-
Decoy host
-D
-
Idle scan
-sI
-
Decoy host
-
Service Fingerprinting
- Depending on the Server field
- Ordering of Header Fields
- Malformed Requests
- Non-existent protocol
- Other Services
-
Web Application Firewall (WAF) Fingerprinting
- Nmap
- WAFW00F
-
DNS
- Domain Information Groper (dig)
- dnsenum
- dnsrecon
- theHarvester
- Discover-scripts
- recon-ng
- Password Profiling
-
Vulnerability Scanning / Discovery
- Nmap
- Metasploit
-
Vulnerability Searching
- Security Focus BugTraq
- Exploit Database
- Metasploit
-
Exploitation
-
Isolating, Testing Potential Malware
- linux containers (LXC)
- Docker
- Virtual Machines
- FireJail
- Qubes
- Offensive
-
Isolating, Testing Potential Malware
-
Documenting and Reporting
- Dradis
- CaseFile
-
Reconnaissance
-
Agile Development and Practices
- Architecture
- Cheapest Place to Deal with Defects
- Evil Test Conditions
- Security Focussed TDD
-
Security Regression Testing
-
Zap REST API Regression Testing NodeGoat
- NodeGoat Set-up on your local machine
- Zap Running on a local VirtualBox guest
- Start the Security Regression test(s) from your local machine
-
Zap REST API Regression Testing NodeGoat
- Hand-crafted Penetration Testing
- Establish a Security Champion
- Pair Programming
-
Code Review
- Why?
- Linting, Static Analysis
- Dynamic Analysis
-
Techniques for Asserting Discipline
- Static Type Checking
- Design by Contract (DbC)
-
Essentials for Creating and Maintaining a High Performance Development Team
-
How and Why Many Software Development Shops Fail
- The Scenario
-
Scrum Teams can Fail Too
- How Does This Happen?
- So… What do We Do?
- How do We Do This
-
How and Why Many Software Development Shops Fail
- Forming Habits and Sharpening Skills
-
Penetration Testing
-
5. Physical
- 1. SSM Asset Identification
-
2. SSM Identify Risks
- Fortress Mentality
- Internal Doors and Cabinets Left Unlocked
- Insecure Doors and/or Windows
- Easily Penetrable Building Materials
- Service Labels
- Sensitive Printed Matter
- RFID Tags
- Computers Logged in and Unlocked
- Networking Equipment
- Network Ports
-
Wi-Fi Access Points
- Hiding the SSID
- Wi-Fi Protected Set-up (WPS)
- Transient Devices
- Lack of Visibility
-
3. SSM Countermeasures
- Fortress Mentality
- Internal Doors and Cabinets Left Unlocked
- Insecure Doors and/or Windows
-
Easily Penetrable Building Materials
- Crime Prevention Through Environmental Design (CPTED)
- Service Labels
- Sensitive Printed Matter
- RFID Tags
- Computers Logged in and Unlocked
- Networking Equipment
- Network Ports
-
Wi-Fi Access Points
- Hiding the SSID
- Wi-Fi Protected Set-up (WPS)
- WPA2 and WPA
- Transient Devices
-
Lack of Visibility
- Cameras, Sensors and Alarms
-
4. SSM Risks that Solution Causes
- Fortress Mentality
- Internal Doors and Cabinets Left Unlocked
- Insecure Doors and/or Windows
- Easily Penetrable Building Materials
- Service Labels
- Sensitive Printed Matter
- RFID Tags
- Computers Logged in and Unlocked
- Networking Equipment
- Network Ports
-
Wi-Fi Access Points
- Hiding the SSID
- Wi-Fi Protected Set-up (WPS)
- WPA2 and WPA
- Transient Devices
-
Lack of Visibility
- Cameras, Sensors and Alarms
-
5. SSM Costs and Trade-offs
- Fortress Mentality
- Internal Doors and Cabinets Left Unlocked
- Insecure Doors and/or Windows
- Easily Penetrable Building Materials
- Service Labels
- Sensitive Printed Matter
- RFID Tags
- Computers Logged in and Unlocked
- Networking Equipment
- Network Ports
-
Wi-Fi Access Points
- Hiding the SSID
- Wi-Fi Protected Set-up (WPS)
- WPA2 and WPA
- Transient Devices
-
Lack of Visibility
- Cameras, Sensors and Alarms
-
6. People
- 1. SSM Asset Identification
-
2. SSM Identify Risks
- Ignorance
-
Morale, Productivity and Engagement Killers
- Undermined Motivation
- Adding people to a late project
- Noisy, Crowded Offices
- Meetings
- Context Switching
- Employee Snatching
-
Weak Password Strategies
-
Password Profiling
- Crunch
- Common User Passwords Profiler (CUPP)
- Who’s your Daddy (WyD)
- Custom Word List generator (CeWL)
- Wordhound
-
Brute Forcing
- Hydra
- Medusa
- nmap http-form-brute
-
Password Profiling
- Vishing (Phone Calls)
- Spoofing Caller ID
- SMiShing
- Favour for a Favour
- The New Employee
- We Have a Problem
- It’s Just the Cleaner
- Emulating Targets Mannerisms
- Tailgating
- Phishing
- Spear Phishing
-
Infectious Media
-
Social Engineering Toolkit (Set)
- Teensy USB HID
- USB Rubber Ducky
- Other Offerings
- Additional USB Hardware
-
Social Engineering Toolkit (Set)
-
3. SSM Countermeasures
- Ignorance
-
Morale, Productivity and Engagement Killers
- Undermined Motivation
- Adding people to a Late Project
- Noisy, Crowded Offices
- Meetings
- Context Switching
- Top Developer Motivators in Order
-
Employee Snatching
- Exit Interviews
-
Weak Password Strategies
- Brute Forcing
- Vishing (Phone Calls)
- Spoofing Caller Id
- SMiShing
- Favour for a Favour
- The New Employee
- We Have a Problem
- It’s Just the Cleaner
- Emulating Targets Mannerisms
- Tailgating
- Phishing
- Spear Phishing
-
Infectious Media
- An Attacker with Physical Access.
- An Attacker with No Access.
-
4. SSM Risks that Solution Causes
- Ignorance
-
Morale, Productivity and Engagement Killers
- Undermined Motivation
- Adding people to a late project
- Noisy, Crowded Offices
- Meetings
- Context Switching
- Top Developer Motivators in Order
-
Employee Snatching
- Exit Interviews
- Weak Password Strategies
- Vishing (Phone Calls)
- Spoofing Caller ID
- SMiShing
- Favour for a Favour
- The New Employee
- We Have a Problem
- It’s Just the Cleaner
- Emulating Target’s Mannerisms
- Tailgating
- Phishing
- Spear Phishing
- Infectious Media
-
5. SSM Costs and Trade-offs
- Ignorance
-
Morale, Productivity and Engagement Killers
- Undermined Motivation
- Adding people to a late project
- Noisy, Crowded Offices
- Meetings
- Context Switching
- Top Developer Motivators in Order
-
Employee Snatching
- Exit Interviews
- Weak Password Strategies
- Vishing (Phone Calls)
- Spoofing Caller ID
- SMiShing
- Favour for a Favour
- The New Employee
- We Have a Problem
- It’s Just the Cleaner
- Emulating Targets Mannerisms
- Tailgating
- Phishing
- Spear Phishing
- Infectious Media
-
Additional Resources
-
Starting with the 30,000’ View
- Rating of Threats
- Tooling Setup
- Process
- People
-
Starting with the 30,000’ View
-
Attributions
- Introduction
-
The 30,000’ View
- Rating of Threats
- Tooling Setup
- Process
- Physical
- People
Authors have earned$9,886,858writing, publishing and selling on Leanpub, earning 80% royalties while saving up to 25 million pounds of CO2 and up to 46,000 trees.
Learn more about writing on Leanpub
The Leanpub 45-day 100% Happiness Guarantee
Within 45 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.
See full terms
Free Updates. DRM Free.
If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).
Most Leanpub books are available in PDF (for computers), EPUB (for phones and tablets) and MOBI (for Kindle). The formats that a book includes are shown at the top right corner of this page.
Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.
Learn more about Leanpub's ebook formats and where to read them
Top Books
C++ Best Practices
Jason TurnerLevel up your C++, get the tools working for you, eliminate common problems, and move on to more exciting things!
OpenIntro Statistics
David Diez, Christopher Barr, Mine Cetinkaya-Rundel, and OpenIntroA complete foundation for Statistics, also serving as a foundation for Data Science.
Leanpub revenue supports OpenIntro (US-based nonprofit) so we can provide free desk copies to teachers interested in using OpenIntro Statistics in the classroom and expand the project to support free textbooks in other subjects.
More resources: openintro.org.
Functional Design and Architecture
Alexander GraninSoftware Design in Functional Programming, Design Patterns and Practices, Methodologies and Application Architectures. How to build real software in Haskell with less efforts and low risks. The first complete source of knowledge.
Atomic Kotlin
Bruce Eckel and Svetlana IsakovaFor both beginning and experienced programmers! From the author of the multi-award-winning Thinking in C++ and Thinking in Java together with a member of the Kotlin language team comes a book that breaks the concepts into small, easy-to-digest "atoms," along with exercises supported by hints and solutions directly inside IntelliJ IDEA!
R Programming for Data Science
Roger D. PengThis book brings the fundamentals of R programming to you, using the same material developed as part of the industry-leading Johns Hopkins Data Science Specialization. The skills taught in this book will lay the foundation for you to begin your journey learning data science. Printed copies of this book are available through Lulu.
I am a Software Engineer and I am in Charge
Alexis Monville and Michael DoyleI am a Software Engineer and I am in Charge is a real-world, practical book that helps you increase your impact and satisfaction at work no matter who you work with.
In the book, we will follow Sandrine, a fictional character who learns to think in a new way enabling her to take a different course of action.
C++20
Rainer GrimmC++20 is the next big C++ standard after C++11. As C++11 did it, C++20 changes the way we program modern C++. This change is, in particular, due to the big four of C++20: ranges, coroutines, concepts, and modules.
Invest In Digital Health - The Medical Futurist's Guide
Dr. Bertalan MeskoArtificial Intelligence and Digital Health are booming. In this book, we explain why now it's a good time to invest in Digital Health and give recommendations on where to invest by looking at the top 24 technological trends we find the most promising.
Ansible for DevOps
Jeff GeerlingAnsible is a simple, but powerful, server and configuration management tool. Learn to use Ansible effectively, whether you manage one server—or thousands.
The Hundred-Page Machine Learning Book
Andriy BurkovEverything you really need to know in Machine Learning in a hundred pages.
Top Bundles
- #1
Software Architecture for Developers: Volumes 1 & 2 - Technical leadership and communication
2 Books
"Software Architecture for Developers" is a practical and pragmatic guide to modern, lightweight software architecture, specifically aimed at developers. You'll learn:The essence of software architecture.Why the software architecture role should include coding, coaching and collaboration.The things that you really need to think about before... - #2
CCIE Service Provider Ultimate Study Bundle
2 Books
Piotr Jablonski, Lukasz Bromirski, and Nick Russo have joined forces to deliver the only CCIE Service Provider training resource you'll ever need. This bundle contains a detailed and challenging collection of workbook labs, plus an extensively detailed technical reference guide. All of us have earned the CCIE Service Provider certification... - #3
The Future of Digital Health
6 Books
We put together the most popular books from The Medical Futurist to provide a clear picture about the major trends shaping the future of medicine and healthcare. Digital health technologies, artificial intelligence, the future of 20 medical specialties, big pharma, data privacy and how technology giants such as Amazon or Google want to conquer... - #4
Cisco CCNA 200-301 Complet
4 Books
Ce lot comprend les quatre volumes du guide préparation à l'examen de certification Cisco CCNA 200-301. - #5
Modern Management Made Easy
3 Books
Read all three Modern Management Made Easy books. Learn to manage yourself, lead and serve others, and lead the organization. - #6
CCDE Practical Studies (All labs)
3 Books
CCDE lab - #7
Modern C++ by Nicolai Josuttis
2 Books
- #8
"The C++ Standard Library" and "Concurrency with Modern C++"
2 Books
Get my books "The C++ Standard Library" and "Concurrency with Modern C++" in a bundle. The first book gives you the details you should know about the C++ standard library; the second one dives deeper into concurrency with modern C++. In sum, you get more than 600 pages full of modern C++ and about 250 source files presenting the standard library... - #9
Linux Administration Complet
4 Books
Ce lot comprend les quatre volumes du Guide Linux Administration :Linux Administration, Volume 1, Administration fondamentale : Guide pratique de préparation aux examens de certification LPIC 1, Linux Essentials, RHCSA et LFCS. Administration fondamentale. Introduction à Linux. Le Shell. Traitement du texte. Arborescence de fichiers. Sécurité... - #10
Advanced Product Management
3 Books
Get The Art of Strategy, Product Discovery and Lean Product Management with a 20% discount.