Holistic InfoSec For Web Developers, Fascicle 0: Physical and People
Holistic InfoSec For Web Developers, Fascicle 0: Physical and People
Creating and maintaining robust technical solutions that will resist attacks from your adversaries
About the Book
Homepage: https://f0.holisticinfosecforwebdevelopers.com
Contents: https://f0.holisticinfosecforwebdevelopers.com/toc.html
Discounts: If you would like a discount, please email me, letting me know how much you would be willing to pay. The less you pay, the more I may consult with you about your recommendations, direction, etc.
Authors Homepage: binarymist.io
Authors Other Books: https://binarymist.io/publication/kims-selected-publications/
Bundles that include this book
About the Contributors
Contributor
Some contributions to the People chapter. Especially around phishing countermeasures. Chris is the creator of Pond

Contributor
Some contributions to the Physical chapter

Editor

Technical Editor
Table of Contents
- Foreword
-
Preface
- Description
- Purpose
- Reason
- Acknowledgements
- Influences
- Introduction
-
Starting with the 30,000’ View
- 1. SSM Asset Identification
-
2. SSM Identify Risks
- Rating of Threats
- 3. SSM Countermeasures
- 4. SSM Risks that Solution Causes
- 5. SSM Costs and Trade-offs
-
2. 10,000’ View and Lower
- A 10,000’ View Scenario
-
3. Tooling Setup
-
Kali Linux
- What’s Included in Kali Linux
- Kali Linux Install
-
Tools I Use in Kali Linux requiring config, etc
-
Metasploit
- Useful metasploit commands
- metasploit meterpreter client commands
- Using the database and workspaces in metasploit
- BeEF
- Updating BurpSuite
-
Metasploit
-
Tools I Use That Need Adding to Kali Linux
- Terminator
- Discover Scripts
- SmbExec
- Gitrob
- CMSmap
- Veil Framework
- Password Lists
- Common User Passwords Profiler (cupp)
- Http Screenshot
- Psmsf
- Responder
- Custom Scripts from The Hacker Playbook 2
- BypassUAC
- NoSQLMap
- Spiderfoot
- OWASP SecLists
- Net-creds
- Unix-privesc-check
- LinEnum
- Chromium
- Chromium Extensions
- Iceweasel (FireFox with different Licensing) add-ons
-
Additional Hardware
-
TP-LINK TL-WN722N USB Wireless Adapter
- Wi-Fi Adapter:
- Useful commands:
- Reconnaissance:
- Provide USB privileges to guest:
- Provide USB recognition to guest:
- Blacklist Wi-Fi Module on Host:
- Test:
-
TP-LINK TL-WN722N USB Wireless Adapter
-
Windows
-
Tools I Use That Need Adding to Windows
- MinGW
- Hyperion
- psmsf
- Nishang
- PowerSploit
-
Tools I Use That Need Adding to Windows
-
Kali Linux
-
4. Process and Practises
-
Penetration Testing
-
Reconnaissance
- Reconnaissance Forms
- Passive
- Semi-Active
-
Active
- Netcat
- Nmap
-
Concealing NMap Source IP Address
-
Decoy host
-D
-
Idle scan
-sI
-
Decoy host
-
Service Fingerprinting
- Depending on the Server field
- Ordering of Header Fields
- Malformed Requests
- Non-existent protocol
- Other Services
-
Web Application Firewall (WAF) Fingerprinting
- Nmap
- WAFW00F
-
DNS
- Domain Information Groper (dig)
- dnsenum
- dnsrecon
- theHarvester
- Discover-scripts
- recon-ng
- Password Profiling
-
Vulnerability Scanning / Discovery
- Nmap
- Metasploit
-
Vulnerability Searching
- Security Focus BugTraq
- Exploit Database
- Metasploit
-
Exploitation
-
Isolating, Testing Potential Malware
- linux containers (LXC)
- Docker
- Virtual Machines
- FireJail
- Qubes
- Offensive
-
Isolating, Testing Potential Malware
-
Documenting and Reporting
- Dradis
- CaseFile
-
Reconnaissance
-
Agile Development and Practices
- Architecture
- Cheapest Place to Deal with Defects
- Evil Test Conditions
- Security Focussed TDD
-
Security Regression Testing
-
Zap REST API Regression Testing NodeGoat
- NodeGoat Set-up on your local machine
- Zap Running on a local VirtualBox guest
- Start the Security Regression test(s) from your local machine
-
Zap REST API Regression Testing NodeGoat
- Hand-crafted Penetration Testing
- Establish a Security Champion
- Pair Programming
-
Code Review
- Why?
- Linting, Static Analysis
- Dynamic Analysis
-
Techniques for Asserting Discipline
- Static Type Checking
- Design by Contract (DbC)
-
Essentials for Creating and Maintaining a High Performance Development Team
-
How and Why Many Software Development Shops Fail
- The Scenario
-
Scrum Teams can Fail Too
- How Does This Happen?
- So… What do We Do?
- How do We Do This
-
How and Why Many Software Development Shops Fail
- Forming Habits and Sharpening Skills
-
Penetration Testing
-
5. Physical
- 1. SSM Asset Identification
-
2. SSM Identify Risks
- Fortress Mentality
- Internal Doors and Cabinets Left Unlocked
- Insecure Doors and/or Windows
- Easily Penetrable Building Materials
- Service Labels
- Sensitive Printed Matter
- RFID Tags
- Computers Logged in and Unlocked
- Networking Equipment
- Network Ports
-
Wi-Fi Access Points
- Hiding the SSID
- Wi-Fi Protected Set-up (WPS)
- Transient Devices
- Lack of Visibility
-
3. SSM Countermeasures
- Fortress Mentality
- Internal Doors and Cabinets Left Unlocked
- Insecure Doors and/or Windows
-
Easily Penetrable Building Materials
- Crime Prevention Through Environmental Design (CPTED)
- Service Labels
- Sensitive Printed Matter
- RFID Tags
- Computers Logged in and Unlocked
- Networking Equipment
- Network Ports
-
Wi-Fi Access Points
- Hiding the SSID
- Wi-Fi Protected Set-up (WPS)
- WPA2 and WPA
- Transient Devices
-
Lack of Visibility
- Cameras, Sensors and Alarms
-
4. SSM Risks that Solution Causes
- Fortress Mentality
- Internal Doors and Cabinets Left Unlocked
- Insecure Doors and/or Windows
- Easily Penetrable Building Materials
- Service Labels
- Sensitive Printed Matter
- RFID Tags
- Computers Logged in and Unlocked
- Networking Equipment
- Network Ports
-
Wi-Fi Access Points
- Hiding the SSID
- Wi-Fi Protected Set-up (WPS)
- WPA2 and WPA
- Transient Devices
-
Lack of Visibility
- Cameras, Sensors and Alarms
-
5. SSM Costs and Trade-offs
- Fortress Mentality
- Internal Doors and Cabinets Left Unlocked
- Insecure Doors and/or Windows
- Easily Penetrable Building Materials
- Service Labels
- Sensitive Printed Matter
- RFID Tags
- Computers Logged in and Unlocked
- Networking Equipment
- Network Ports
-
Wi-Fi Access Points
- Hiding the SSID
- Wi-Fi Protected Set-up (WPS)
- WPA2 and WPA
- Transient Devices
-
Lack of Visibility
- Cameras, Sensors and Alarms
-
6. People
- 1. SSM Asset Identification
-
2. SSM Identify Risks
- Ignorance
-
Morale, Productivity and Engagement Killers
- Undermined Motivation
- Adding people to a late project
- Noisy, Crowded Offices
- Meetings
- Context Switching
- Employee Snatching
-
Weak Password Strategies
-
Password Profiling
- Crunch
- Common User Passwords Profiler (CUPP)
- Who’s your Daddy (WyD)
- Custom Word List generator (CeWL)
- Wordhound
-
Brute Forcing
- Hydra
- Medusa
- nmap http-form-brute
-
Password Profiling
- Vishing (Phone Calls)
- Spoofing Caller ID
- SMiShing
- Favour for a Favour
- The New Employee
- We Have a Problem
- It’s Just the Cleaner
- Emulating Targets Mannerisms
- Tailgating
- Phishing
- Spear Phishing
-
Infectious Media
-
Social Engineering Toolkit (Set)
- Teensy USB HID
- USB Rubber Ducky
- Other Offerings
- Additional USB Hardware
-
Social Engineering Toolkit (Set)
-
3. SSM Countermeasures
- Ignorance
-
Morale, Productivity and Engagement Killers
- Undermined Motivation
- Adding people to a Late Project
- Noisy, Crowded Offices
- Meetings
- Context Switching
- Top Developer Motivators in Order
-
Employee Snatching
- Exit Interviews
-
Weak Password Strategies
- Brute Forcing
- Vishing (Phone Calls)
- Spoofing Caller Id
- SMiShing
- Favour for a Favour
- The New Employee
- We Have a Problem
- It’s Just the Cleaner
- Emulating Targets Mannerisms
- Tailgating
- Phishing
- Spear Phishing
-
Infectious Media
- An Attacker with Physical Access.
- An Attacker with No Access.
-
4. SSM Risks that Solution Causes
- Ignorance
-
Morale, Productivity and Engagement Killers
- Undermined Motivation
- Adding people to a late project
- Noisy, Crowded Offices
- Meetings
- Context Switching
- Top Developer Motivators in Order
-
Employee Snatching
- Exit Interviews
- Weak Password Strategies
- Vishing (Phone Calls)
- Spoofing Caller ID
- SMiShing
- Favour for a Favour
- The New Employee
- We Have a Problem
- It’s Just the Cleaner
- Emulating Target’s Mannerisms
- Tailgating
- Phishing
- Spear Phishing
- Infectious Media
-
5. SSM Costs and Trade-offs
- Ignorance
-
Morale, Productivity and Engagement Killers
- Undermined Motivation
- Adding people to a late project
- Noisy, Crowded Offices
- Meetings
- Context Switching
- Top Developer Motivators in Order
-
Employee Snatching
- Exit Interviews
- Weak Password Strategies
- Vishing (Phone Calls)
- Spoofing Caller ID
- SMiShing
- Favour for a Favour
- The New Employee
- We Have a Problem
- It’s Just the Cleaner
- Emulating Targets Mannerisms
- Tailgating
- Phishing
- Spear Phishing
- Infectious Media
-
Additional Resources
-
Starting with the 30,000’ View
- Rating of Threats
- Tooling Setup
- Process
- People
-
Starting with the 30,000’ View
-
Attributions
- Introduction
-
The 30,000’ View
- Rating of Threats
- Tooling Setup
- Process
- Physical
- People
The Leanpub 60-day 100% Happiness Guarantee
Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.
See full terms
80% Royalties. Earn $16 on a $20 book.
We pay 80% royalties. That's not a typo: you earn $16 on a $20 sale. If we sell 5000 non-refunded copies of your book or course for $20, you'll earn $80,000.
(Yes, some authors have already earned much more than that on Leanpub.)
In fact, authors have earned$12,307,240writing, publishing and selling on Leanpub.
Learn more about writing on Leanpub
Free Updates. DRM Free.
If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).
Most Leanpub books are available in PDF (for computers) and EPUB (for phones, tablets and Kindle). The formats that a book includes are shown at the top right corner of this page.
Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.
Learn more about Leanpub's ebook formats and where to read them
Top Books
OpenIntro Statistics
David Diez, Christopher Barr, Mine Cetinkaya-Rundel, and OpenIntroA complete foundation for Statistics, also serving as a foundation for Data Science.
Leanpub revenue supports OpenIntro (US-based nonprofit) so we can provide free desk copies to teachers interested in using OpenIntro Statistics in the classroom and expand the project to support free textbooks in other subjects.
More resources: openintro.org.
Personal Finance
Jason AndersonThis textbook provides an in-depth analysis on personal finance that is both practical and straightforward in its approach. It has been written in such a way that the readers can gain knowledge without getting overwhelmed by the technical terms. Suitable for both beginners and advanced learners.
Getting to Know IntelliJ IDEA
Trisha Gee and Helen ScottIf we treat our IDE as a text editor, we are doing ourselves a disservice. Using a combination of tutorials and a questions-and-answers approach, Getting to Know IntelliJ IDEA will help you find ways to use IntelliJ IDEA that enable you to work comfortably and productively as a professional developer.
C++20 - The Complete Guide
Nicolai M. JosuttisAll new language and library features of C++20 (for those who know previous C++ versions).
The book presents all new language and library features of C++20. Learn how this impacts day-to-day programming, to benefit in practice, to combine new features, and to avoid all new traps.
Buy early, pay less, free updates.
Other books:
Mastering STM32 - Second Edition
Carmine NovielloWith more than 1200 microcontrollers, STM32 is probably the most complete ARM Cortex-M platform on the market. This book aims to be the most complete guide around introducing the reader to this exciting MCU portfolio from ST Microelectronics and its official CubeHAL and STM32CubeIDE development environment.
R Programming for Data Science
Roger D. PengThis book brings the fundamentals of R programming to you, using the same material developed as part of the industry-leading Johns Hopkins Data Science Specialization. The skills taught in this book will lay the foundation for you to begin your journey learning data science. Printed copies of this book are available through Lulu.
Machine Learning Q and AI
Sebastian Raschka, PhDHave you recently completed a machine learning or deep learning course and wondered what to learn next? With 30 questions and answers on key concepts in machine learning and AI, this book provides bite-sized bits of knowledge for your journey to becoming a machine learning expert.
Stats One
William FooteThe Rails 7 Way
Obie Fernandez, Lucas Dohmen, and Tom Henrik AadlandThe Rails™ 7 Way is the comprehensive, authoritative reference guide for professionals delivering production-quality code using modern Ruby on Rails. It illuminates the entire Rails 7 API, its most powerful idioms, design approaches, and libraries. Building on the previous editions, this edition has been heavily refactored and updated.
Gradual Modularization for Ruby and Rails
Stephan HagemannGet yourself a new tool to manage your Rails application and your growing engineering organization! Prevent the ball-of-mud (and fix it!). Go for microservices or SOA if it makes sense not just because you don't have any other tool. Do all this through a low-overhead tool: packages. Enable better conversations to make practical changes today.
Top Bundles
- #1
Software Architecture
2 Books
"Software Architecture for Developers" is a practical and pragmatic guide to modern, lightweight software architecture, specifically aimed at developers. You'll learn:The essence of software architecture.Why the software architecture role should include coding, coaching and collaboration.The things that you really need to think about before... - #2
CCIE Service Provider Ultimate Study Bundle
2 Books
Piotr Jablonski, Lukasz Bromirski, and Nick Russo have joined forces to deliver the only CCIE Service Provider training resource you'll ever need. This bundle contains a detailed and challenging collection of workbook labs, plus an extensively detailed technical reference guide. All of us have earned the CCIE Service Provider certification... - #3
1500 QUIZ COMMENTATI (3 libri)
3 Books
Tre libri dei QUIZ MMG Commentati al prezzo di DUE! I QUIZ dei concorsi ufficiali di Medicina Generale relativi agli anni: 2000-2001-2003-2012-2013-2014-2015-2016-2017-2018-2019-2020-2021 +100 inediti Raccolti in unico bundle per aiutarvi nello studio e nella preparazione al concorso. All'interno di ogni libro i quiz sono stati suddivisi per... - #4
Pattern-Oriented Memory Forensics and Malware Detection
2 Books
This training bundle for security engineers and researchers, malware and memory forensics analysts includes two accelerated training courses for Windows memory dump analysis using WinDbg. It is also useful for technical support and escalation engineers who analyze memory dumps from complex software environments and need to check for possible... - #5
Practical FP in Scala + Functional event-driven architecture
2 Books
Practical FP in Scala (A hands-on approach) & Functional event-driven architecture, aka FEDA, (Powered by Scala 3), together as a bundle! The content of PFP in Scala is a requirement to understand FEDA so why not take advantage of this bundle!? - #6
Modern C++ Collection
3 Books
Get All about Modern C++C++ Standard Library, including C++20Concurrency with Modern C++, including C++20C++20Each book has about 200 complete code examples. Updates are included. When I update one of the books, you immediately get the updated bundle. You can expect significant updates to each new C++ standard (C++23, C++26, .. ) and also... - #7
Linux Administration Complet
4 Books
Ce lot comprend les quatre volumes du Guide Linux Administration :Linux Administration, Volume 1, Administration fondamentale : Guide pratique de préparation aux examens de certification LPIC 1, Linux Essentials, RHCSA et LFCS. Administration fondamentale. Introduction à Linux. Le Shell. Traitement du texte. Arborescence de fichiers. Sécurité... - #9
Development and Deployment of Multiplayer Online Games, Part ARCH. Architecture (Vol. I-III)
3 Books
What's the Big Idea? The idea behind this book is to summarize the body of knowledge that already exists on multiplayer games but is not available in one single place.And quite a fewof the issues discussed within this series (planned as three nine volumes ~300 pages each), while known in the industry, have not been published at all (except for... - #10
Growing Agile: The Complete Coach's Guide
7 Books
Growing Agile: Coach's Guide Series This bundle provides a collection of training and workshop plans for a variety of agile topics. The series is aimed at agile coaches, trainers and ScrumMasters who often find themselves needing to help teams understand agile concepts. Each book in the series provides the plans, slides, handouts and activity...