This chapter covers
- Leveraging the hacker mindset and the OODA loop models to plan out our own theoretical attacks against home and company networks
- Exploring how data injection attacks work
- Using knowledge of the different types of malware to create defensive strategies
- Exploring Wi-Fi and mobile phone networks and how data can be intercepted and spoofed
Now that we’ve looked at how to think like a hacker and what mental models we can use, we get to the really fun stuff: exploring how the most common external attacks work. As part of helping you anticipate external attacks, this chapter will have several exercises to teach you how to think and plan an attack yourself. We’ll also look at the different types of malware, as well as dig into the security problems with Wi-Fi and mobile phone networks.
By the chapter’s end, you will be able to think like an attacker—to understand how and why some of the most common attacks work. By understanding how to use malware and attacks using security problems with Wi-Fi and mobile networks to steal users’ credentials and data, you’ll be better able to defend against these attacks.