Cyber Guerilla

 
 
Syngress (Verlag)
  • 1. Auflage
  • |
  • erschienen am 13. Juni 2016
  • |
  • 142 Seiten
 
E-Book | ePUB mit Adobe DRM | Systemvoraussetzungen
E-Book | PDF mit Adobe DRM | Systemvoraussetzungen
978-0-12-805284-6 (ISBN)
 

Much as Che Guevara's book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape.

Cyber Guerilla provides valuable insight for infosec professionals and consultants, as well as government, military, and corporate IT strategists who must defend against myriad threats from non-state actors. The authors take readers inside the operations and tactics of cyber guerillas, who are changing the dynamics of cyber warfare and information security through their unconventional strategies and threats. This book draws lessons from the authors' own experiences but also from illustrative hacker groups such as Anonymous, LulzSec and Rebellious Rose.


  • Discusses the conceptual and ideological foundation of hackers and hacker groups
  • Provides concrete footholds regarding hacker group strategy
  • Discusses how cyber guerillas are changing the face of cyber warfare and cyber security through asymmetrical, flexible and stealthy means and methods
  • Explains the tactics, techniques, and procedures these hacker groups use in their operations
  • Describes how cyber guerrillas and hackers use the media and influence the public
  • Serves as a must-have guide for anyone who wants to understand-or is responsible for defending against-cyber warfare attacks


Jelle Van Haaster, LL.M. University Utrecht, BA War Studies, Faculty of Military Sciences, is an award-winning writer, software programmer/developer, and speaker. He is an officer in the Royal Netherlands Army and has a diverse background in legal, military, and technical defense matters. Jelle recently developed an award-winning software app for effectively utilizing social media during military operations, and he is the author of multiple scholarly IT-Law, IT, and military-operational publications. He is currently completing his multidisciplinary Ph.D. thesis on the future utility of military Cyber Operations during conflicts at the Netherlands Defense Academy and University of Amsterdam.
  • Englisch
  • Saint Louis
  • |
  • USA
Elsevier Science
  • 6,19 MB
978-0-12-805284-6 (9780128052846)
0128052848 (0128052848)
weitere Ausgaben werden ermittelt
  • Cover
  • Title Page
  • Copyright Page
  • Contents
  • About the Authors
  • Foreword
  • Preface
  • Introduction
  • Chapter 1 - General principles of cyber guerilla
  • Introduction
  • The essence of cyber guerilla
  • Cyber guerilla strategy
  • Cyber guerilla tactics
  • Cyber warfare on favorable terrain (When to wage guerilla)
  • Cyber warfare on unfavorable terrain
  • Conclusions
  • Chapter 2 - The hacker group
  • Introduction
  • The hacker as social reformer
  • The hacker as combatant
  • The hacker group
  • Disciplines
  • Leadership
  • Infrastructure
  • Hacked infrastructure
  • Shared web server
  • Virtual private server
  • Dedicated servers
  • Physical access infrastructure
  • Infrastructure ordered with stolen credit cards
  • Anonymously purchased infrastructure
  • Other assets
  • Code signing certificates
  • VoIP servers
  • Internal communication
  • The Onion Ring network
  • Internet Relay Chat
  • Levels of trust
  • Forums
  • Mobile phone messengers
  • VPNs and CloudFlare
  • Unconventional means and methods
  • Recruiting
  • Engineering
  • The producer
  • The viral growth engineer
  • The creative hacker/engineer
  • Forensics
  • Command and control
  • Data exfiltration
  • Call backs
  • Proxies
  • Backend server
  • Developers
  • External communication
  • Press relations
  • Conclusions
  • Chapter 3 - Organization of #operations
  • Introduction
  • Intelligence
  • Counterintelligence in general
  • Counterintelligence during operations
  • Operations
  • Cyber kill chain
  • Reconnaissance
  • Organizational aspects
  • Defensive processes and mechanisms
  • Technical aspects-available infrastructure and architecture
  • Infrastructure layer
  • Application layer
  • Additional reconnaissance actions
  • Weaponization
  • Delivery
  • Direct delivery
  • Exploitation of common vulnerabilities
  • Exploitation of uncommon vulnerabilities-zero day
  • Physical delivery
  • Denial-of-service (DOS)
  • Indirect delivery
  • Spear-phishing attacks
  • Watering hole attacks
  • Supply chain attacks
  • Insider help
  • Exploitation, installation, command and control and actions on objectives
  • Advanced persistent threat life cycle
  • Initial compromise
  • Establish foothold
  • Escalate privileges
  • Internal reconnaissance
  • Move laterally
  • Maintain presence
  • Complete mission
  • Considerations during operations
  • Target architectures and network segregation
  • Attacking a network without segregation
  • Attacking a network with limited segregation
  • Attacking a heavily segregated network
  • Dealing with monitoring and defense systems
  • Ad hoc detection
  • Limited monitoring
  • Extensive monitoring
  • Limits of encryption
  • Tools and techniques
  • Evasion techniques
  • Evading signature-based malware detection
  • Evading reputation-based malware detection
  • Evading heuristic-based malware detection
  • Evading network-based malware detection
  • Evading hunting teams
  • Network scanning tools
  • Mapping tools for (internal) reconnaissance
  • Password cracking tools
  • Miscellaneous tools
  • Effects
  • Overview of effects
  • Inform
  • Mislead
  • Cognitively degrade
  • Deny, disrupt, and degrade
  • Destroy
  • Media strategy
  • Media organization within the hacker group
  • Considerations
  • New media
  • Using social media
  • Using mail
  • Using instant messaging
  • Text messages
  • Forums
  • Blogs
  • Multiplayer gamingj
  • Other online capabilities
  • Using conventional media
  • Telephone
  • Television, radio, newspapers/magazines, online news websites
  • Postoperation posturing
  • Chapter 4 - Appendices
  • Introduction
  • Illustrative hacker groups (Rickey Gevers)
  • Anonymous
  • LulzSec
  • Jeremy Hammond-AntiSecurity
  • Cult of the Dead Cow "cDc"
  • Team TESO/ADM/w00w00/LSD-PL
  • Chaos Computer Club
  • Chinese APTs
  • Rebellious Rose
  • Anons Bataclan
  • Future of hacker groups
  • Future of Chapter 1 (Jelle van Haaster)
  • Future of Chapter 2 (Rickey Gevers)
  • Future of Chapter 3 (Martijn Sprengers)
  • Index
  • Back Cover

Dateiformat: EPUB
Kopierschutz: Adobe-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat EPUB ist sehr gut für Romane und Sachbücher geeignet - also für "fließenden" Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Dateiformat: PDF
Kopierschutz: Adobe-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Download (sofort verfügbar)

42,78 €
inkl. 19% MwSt.
Download / Einzel-Lizenz
ePUB mit Adobe DRM
siehe Systemvoraussetzungen
PDF mit Adobe DRM
siehe Systemvoraussetzungen
Hinweis: Die Auswahl des von Ihnen gewünschten Dateiformats und des Kopierschutzes erfolgt erst im System des E-Book Anbieters
E-Book bestellen

Unsere Web-Seiten verwenden Cookies. Mit der Nutzung des WebShops erklären Sie sich damit einverstanden. Mehr Informationen finden Sie in unserem Datenschutzhinweis. Ok