Cover image for Network Attacks and Exploitation : A Framework.
Network Attacks and Exploitation : A Framework.
Title:
Network Attacks and Exploitation : A Framework.
Author:
Monte, Matthew.
ISBN:
9781118987230
Personal Author:
Edition:
1st ed.
Physical Description:
1 online resource (219 pages)
Contents:
Cover -- Title Page -- Copyright -- Contents -- Introduction -- Chapter 1 Computer Network Exploitation -- Operations -- Operational Objectives -- Strategic Collection -- Directed Collection -- Non-Kinetic Computer Network Attack (CNA) -- Strategic Access -- Positional Access -- CNE Revisited -- A Framework for Computer Network Exploitation -- First Principles -- Principles -- Themes -- Summary -- Chapter 2 The Attacker -- Principle of Humanity -- Life Cycle of an Operation -- Stage 1: Targeting -- Stage 2: Initial Access -- Stage 3: Persistence -- Stage 4: Expansion -- Stage 5: Exfiltration -- Stage 6: Detection -- Principle of Access -- Inbound Access -- Outbound Access -- Bidirectional Access -- No Outside Access -- Access Summary -- Principle of Economy -- Time -- Targeting Capabilities -- Exploitation Expertise -- Networking Expertise -- Software Development Expertise -- Operational Expertise -- Operational Analysis Expertise -- Technical Resources -- Economy Summary -- Attacker Structure -- Summary -- Chapter 3 The Defender -- Principle of Humanity -- Humanity and Network Layout -- Humanity and Security Policy -- Principle of Access -- The Defensive Life Cycle -- Principle of Economy -- The Helpful Defender -- Summary -- Chapter 4 Asymmetries -- False Asymmetries -- Advantage Attacker -- Motivation -- Initiative -- Focus -- Effect of Failure -- Knowledge of Technology -- Analysis of Opponent -- Tailored Software -- Rate of Change -- Advantage Defender -- Network Awareness -- Network Posture -- Advantage Indeterminate -- Time -- Efficiency -- Summary -- Chapter 5 Attacker Frictions -- Mistakes -- Complexity -- Flawed Attack Tools -- Upgrades and Updates -- Other Attackers -- The Security Community -- Bad Luck -- Summary -- Chapter 6 Defender Frictions -- Mistakes -- Flawed Software -- Inertia.

The Security Community -- Complexity -- Users -- Bad Luck -- Summary -- Chapter 7 Offensive Strategy -- Principle 1: Knowledge -- Measuring Knowledge -- Principle 2: Awareness -- Measuring Awareness -- Principle 3: Innovation -- Measuring Innovation -- Defensive Innovation -- Principle 4: Precaution -- Measuring Precaution -- Principle 5: Operational Security -- Minimizing Exposure -- Minimizing Recognition -- Controlling Reaction -- Measuring Operational Security -- Principle 6: Program Security -- Attacker Liabilities -- Program Security Costs -- Measuring Program Security -- Crafting an Offensive Strategy -- Modular Frameworks -- A Note on Tactical Decisions -- Summary -- Chapter 8 Defensive Strategy -- Failed Tactics -- Antivirus and Signature-Based Detection -- Password Policies -- User Training -- Crafting a Defensive Strategy -- Cloud-Based Security -- Summary -- Chapter 9 Offensive Case Studies -- Stuxnet -- Access -- Economy -- Humanity -- Knowledge -- Awareness -- Precaution -- Innovation -- Operational Security -- Program Security -- Stuxnet Summary -- Flame -- Gauss -- Dragonfly -- Red October -- APT1 -- Axiom -- Summary -- Epilogue -- Appendix Attack Tools -- Antivirus Defeats -- Audio/Webcam Recording -- Backdoor -- Bootkit -- Collection Tools -- Exploits -- Fuzzer -- Hardware-based Trojan -- Implant -- Keystroke Logger -- Network Capture -- Network Survey -- Network Tunnel -- Password Dumpers and Crackers -- Packer -- Persistence Mechanism -- Polymorphic Code Generator -- Rootkit -- Screen Scraper -- System Survey -- Vulnerability Scanner -- References -- Bibliography -- Index -- EULA.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: