Dear Reader,
First, thank you for your purchase of the Think Like a Hacker audiobook! The following images and drawings will be referenced during the book. Please consider printing a copy of this page for reference if you will be listening to the book offline.
Sincerely,
Michael J. Melone
Chapter: Vulnerability Chaining
Figure 1 – The association between securables, domains, and principals
Figure 2 – Obtaining Authorization to the CEO’s Mailbox
Figure 3 – Becoming a Domain Admin
Figure 4 – Social Engineering
Chapter: Designing an Access and Authorization Strategy
Figure 5 – Monolithic Architecture
Figure 6 – Tiered Authentication Model
Figure 7 – Three Ships Architectural Analogy
Figure 8 – Service Centric Architecture
Figure 9 – Hybrid Tiered Service Centric Architecture