The Attacker

Attacker motivations are many and varied. The Attacker that can understand the paradox of the humanity infused into technology will think like its creators, will see their assumptions, and will find ways to violate those assumptions to great effect. This chapter describes the stages of an offensive...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Monte, Matthew
Format: Buchkapitel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Attacker motivations are many and varied. The Attacker that can understand the paradox of the humanity infused into technology will think like its creators, will see their assumptions, and will find ways to violate those assumptions to great effect. This chapter describes the stages of an offensive operation that include: targeting, initial access, persistence, expansion, exfiltration, and detection. The approach the Attacker takes to gain initial access depends on the type of connectivity the target network offers. There are four basic types of connectivity: inbound access, outbound access, both, and neither. Operational expertise is essential to creatively sustaining operations in the face of adversity. Attackers with operational expertise can adapt existing or improvise new techniques to accomplish their operational objective while remaining undetected. Operational analysis is leveraged to direct each step and every movement of the Attacker in every stage of the life cycle.
DOI:10.1002/9781119183440.ch2