Intro
Table of Contents
About the Authors
Chapter 1: Introduction
Hacking Is Different
Bad Team, Good Team
Why This Book Matters
Chapter 2: The Service
Definitions
Offensive Cybersecurity Service (OCS)
Team Types
Penetration Testing Team
Red Team
Purple Team
Team Differences
Internal vs. Consultative
Establishing the Service
Vision
Structure
Lead
Project
Client
Team
Capability
Team Structure
Leadership
Member Composition
Chapter 3: Finding and Retaining Talent
Sourcing Talent
Community Engagement
Referrals
Job Requisition Postings
Third-Party Recruiters
Internal Recruiting Team
Summary
Assessing Candidates
Conducting the Interview
Technical Assessment
Team Compatibility Assessment
Retaining Talent
The Mission Mindset
Constructing a Mission
Setting the Standard
Lead
Project
Client
Team
Capability
Technical Challenges
Compensation
Burnout
Chapter 4: Team Management
Time Management
The System
Rules
Staffing
Cheap and Scalable
Handling Disruptions
Team Coordination
Preparing for Client Communication
Daily Standup
Vulnerability Sharing
Retrospective
Team Climate
Getting Started
All-Day Call
Team Building Activities
Negative Team Members
Player Over Pawn: Transparent and Inclusive Management Practices
Experimentation
Chapter 5: Operational Management
Client Management
Initial Handoff
Kickoff
Engagement Time
Outbrief
Project Execution
Single Point of Information
Pre-engagement
Scope Creep
Daily Reporting
Post-engagement
Operational Checklists
Good Penetration Testing vs. Effective Penetration Testing
Chapter 6: Developing Hackers
Disclaimer
If You're Not Getting Better, You're Getting Worse and Fast
Self-development Is Not Enough
Building a Team Development Strategy
Individual vs. Capability Development
Setting Levels
Level Baselines
Capability Evolutions
Capability Leads
Core and Peripherial Capabilities
Executing the Strategy
Billable Time
Resources and Tools
Technical Conferences
College
Educational Courses
On-the-Job Training
Research
Finishing the Story
Final Thought
Chapter 7: Understanding Clients
Types of Clients
Understanding Your Audience
Internal Teams
Commercial Clients
Controlled Sectors
Client Motivations and Concerns
Required by Certification
Security Concerns
Hacking for Policy Change
Previous Bad Experiences
Helping the Client
Industry Comparisons
Alternative Approaches
Change the Scope
Client Relationship Pitfalls
No Surprises
Client Sabotage
Chapter 8: Engagement Security
Preventing Outages
When Outages Occur
Benefiting from an Outage
Handling Negligent Pentesters
Do No Harm
Team Equipment
Communication Security
Data Creep