Network attacks & exploitation: a framework
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Indianapolis, Ind.
Wiley
2015
|
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XVIII, 198 S. Ill., graph. Darst. |
ISBN: | 9781118987124 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV042643704 | ||
003 | DE-604 | ||
005 | 20151029 | ||
007 | t | ||
008 | 150626s2015 gw ad|| |||| 00||| eng d | ||
016 | 7 | |a 1067667067 |2 DE-101 | |
020 | |a 9781118987124 |c Pb. : ca. EUR 39.90 (DE) (freier Pr.), ca. sfr 53.90 (freier Pr.) |9 978-1-118-98712-4 | ||
024 | 3 | |a 9781118987124 | |
028 | 5 | 2 | |a Best.-Nr.: 1W118987120 |
035 | |a (OCoLC)920688001 | ||
035 | |a (DE-599)DNB1067667067 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE | ||
049 | |a DE-91G |a DE-29T |a DE-20 |a DE-11 | ||
082 | 0 | |a 004 |2 23 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 461f |2 stub | ||
100 | 1 | |a Monte, Matthew |e Verfasser |4 aut | |
245 | 1 | 0 | |a Network attacks & exploitation |b a framework |c Matthew Monte |
246 | 1 | 3 | |a Network attacks and exploitation |
264 | 1 | |a Indianapolis, Ind. |b Wiley |c 2015 | |
300 | |a XVIII, 198 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Netzwerk |0 (DE-588)4171529-9 |2 gnd |9 rswk-swf |
653 | |a Computersicherheit | ||
653 | |a Netzwerk | ||
653 | |a Netzwerksicherheit | ||
689 | 0 | 0 | |a Netzwerk |0 (DE-588)4171529-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-118-98708-7 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-118-98723-0 |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=5164791&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028076027&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-028076027 |
Datensatz im Suchindex
_version_ | 1806331744558776320 |
---|---|
adam_text |
Titel: Network attacks exploitation
Autor: Monte, Matthew
Jahr: 2015
: |f§Sg||ij Lillis Introduction xvii Chapter 1 Computer Network Exploitation 1 Operations 4 Operational Objectives 5 Strategic Collection 6 Directed Collection 7 Non-Kinetic Computer Network Attack (CNA) 7 Strategic Access 9 Positional Access 9 CNE Revisited 11 A Framework for Computer Network Exploitation 11 First Principles 12 Principles 12 Themes 14 Summary 15 Chapter 2 The Attacker 17 Principle of Humanity 17 Life Cycle of an Operation 18 Stage 1: Targeting 19 Stage 2: Initial Access 22 Stage 3: Persistence 24 Stage 4: Expansion 25 Stage 5: Exfiltration 26 Stage 6: Detection 26 Principle of Access 27 Inbound Access 27 Outbound Access 29 Bidirectional Access 35 xiii
xiv Contents No Outside Access 35 Access Summary 36 Principle of Economy 37 Time 37 Targeting Capabilities 37 Exploitation Expertise 38 Networking Expertise 38 Software Development Expertise 39 Operational Expertise 40 Operational Analysis Expertise 40 Technical Resources 41 Economy Summary 41 Attacker Structure 41 Summary 43 Chapter 3 The Defender 45 Principle of Humanity 45 Humanity and Network Layout 46 Humanity and Security Policy 47 Principle of Access 48 The Defensive Life Cycle 49 Principle of Economy 51 The Helpful Defender 53 Summary 54 Chapter 4 Asymmetries 55 False Asymmetries 56 Advantage Attacker 59 Motivation 60 Initiative 61 Focus 62 Effect of Failure 62 Knowledge of Technology 64 Analysis of Opponent 64 Tailored Software 65 Rate of Change 66 Advantage Defender 67 Network Awareness 68 Network Posture 68 Advantage Indeterminate 69 Time 69 Efficiency 70 Summary 71 Chapter 5 Attacker Frictions 73 Mistakes 74 Complexity 74 Flawed Attack Tools 75
77 78 80 81 81 83 83 84 86 87 89 91 92 92 93 95 96 97 98 98 99 100 101 103 105 106 107 108 109 110 110 112 120 121 124 126 127 129 130 130 132 134 Upgrades and Updates Other Attackers The Security Community Bad Luck Summary Defender Frictions Mistakes Flawed Software Inertia The Security Community Complexity Users Bad Luck Summary Offensive Strategy Principle 1: Knowledge Measuring Knowledge Principle 2: Awareness Measuring Awareness Principle 3: Innovation Measuring Innovation Defensive Innovation Principle 4: Precaution Measuring Precaution Principle 5: Operational Security Minimizing Exposure Minimizing Recognition Controlling Reaction Measuring Operational Security Principle 6: Program Security Attacker Liabilities Program Security Costs Measuring Program Security Crafting an Offensive Strategy Modular Frameworks A Note on Tactical Decisions Summary Defensive Strategy Failed Tactics Antivirus and Signature-Based Detection Password Policies User Training Crafting a Defensive Strategy Cloud-Based Security Summary
xvi Contents Chapter 9 Offensive Case Studies 147 Stuxnet 148 Access 148 Economy 149 Humanity 149 Knowledge 149 Awareness 149 Precaution 150 Innovation 151 Operational Security 151 Program Security 153 Stuxnet Summary 154 Flame 154 Gauss 157 Dragonfly 159 Red October 160 APT1 162 Axiom 164 Summary 165 Epilogue 167 Appendix Attack Tools 169 Antivirus Defeats 169 Audio/Webcam Recording 170 Backdoor 170 Bootkit 171 Collection Tools 171 Exploits 171 Fuzzer 172 Hardware-based Trojan 172 Implant 173 Keystroke Logger 173 Network Capture 173 Network Survey 173 Network Tunnel 174 Password Dumpers and Crackers 174 Packer 175 Persistence Mechanism 175 Polymorphic Code Generator 177 Rootkit 178 Screen Scraper 178 System Survey 178 Vulnerability Scanner 178 References 179 Bibliography 189 Index 193 |
any_adam_object | 1 |
author | Monte, Matthew |
author_facet | Monte, Matthew |
author_role | aut |
author_sort | Monte, Matthew |
author_variant | m m mm |
building | Verbundindex |
bvnumber | BV042643704 |
classification_rvk | ST 200 ST 277 |
classification_tum | DAT 461f |
ctrlnum | (OCoLC)920688001 (DE-599)DNB1067667067 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV042643704</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20151029</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">150626s2015 gw ad|| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1067667067</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118987124</subfield><subfield code="c">Pb. : ca. EUR 39.90 (DE) (freier Pr.), ca. sfr 53.90 (freier Pr.)</subfield><subfield code="9">978-1-118-98712-4</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781118987124</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 1W118987120</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)920688001</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1067667067</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Monte, Matthew</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network attacks & exploitation</subfield><subfield code="b">a framework</subfield><subfield code="c">Matthew Monte</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Network attacks and exploitation</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, Ind.</subfield><subfield code="b">Wiley</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVIII, 198 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computersicherheit</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Netzwerk</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Netzwerksicherheit</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-118-98708-7</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-118-98723-0</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=5164791&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028076027&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028076027</subfield></datafield></record></collection> |
id | DE-604.BV042643704 |
illustrated | Illustrated |
indexdate | 2024-08-03T02:29:50Z |
institution | BVB |
isbn | 9781118987124 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028076027 |
oclc_num | 920688001 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-29T DE-20 DE-11 |
owner_facet | DE-91G DE-BY-TUM DE-29T DE-20 DE-11 |
physical | XVIII, 198 S. Ill., graph. Darst. |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Wiley |
record_format | marc |
spelling | Monte, Matthew Verfasser aut Network attacks & exploitation a framework Matthew Monte Network attacks and exploitation Indianapolis, Ind. Wiley 2015 XVIII, 198 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Computersicherheit (DE-588)4274324-2 gnd rswk-swf Netzwerk (DE-588)4171529-9 gnd rswk-swf Computersicherheit Netzwerk Netzwerksicherheit Netzwerk (DE-588)4171529-9 s Computersicherheit (DE-588)4274324-2 s DE-604 Erscheint auch als Online-Ausgabe 978-1-118-98708-7 Erscheint auch als Online-Ausgabe 978-1-118-98723-0 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=5164791&prov=M&dok_var=1&dok_ext=htm Inhaltstext HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028076027&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Monte, Matthew Network attacks & exploitation a framework Computersicherheit (DE-588)4274324-2 gnd Netzwerk (DE-588)4171529-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4171529-9 |
title | Network attacks & exploitation a framework |
title_alt | Network attacks and exploitation |
title_auth | Network attacks & exploitation a framework |
title_exact_search | Network attacks & exploitation a framework |
title_full | Network attacks & exploitation a framework Matthew Monte |
title_fullStr | Network attacks & exploitation a framework Matthew Monte |
title_full_unstemmed | Network attacks & exploitation a framework Matthew Monte |
title_short | Network attacks & exploitation |
title_sort | network attacks exploitation a framework |
title_sub | a framework |
topic | Computersicherheit (DE-588)4274324-2 gnd Netzwerk (DE-588)4171529-9 gnd |
topic_facet | Computersicherheit Netzwerk |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=5164791&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028076027&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT montematthew networkattacksexploitationaframework AT montematthew networkattacksandexploitation |