2 options
Ultimate Cyberwarfare for Evasive Cyber Tactics / Chang Tan.
- Format:
- Book
- Author/Creator:
- Tan, Chang, author.
- Language:
- English
- Subjects (All):
- Programming languages (Electronic computers).
- Physical Description:
- 1 online resource (278 pages)
- Edition:
- First edition.
- Place of Publication:
- Delhi : Orange Education Pvt Ltd, [2024]
- Summary:
- The "Ultimate Cyberwarfare for Evasive Cyber Tactic" is an all-encompassing guide, meticulously unfolding across pivotal cybersecurity domains, providing a thorough overview of cyber warfare.The book begins by unraveling the tapestry of today's cyber landscape, exploring current threats, implementation strategies, and notable trends. From operational security triumphs to poignant case studies of failures, readers gain valuable insights through real-world case studies. The book delves into the force-multiplying potential of the Information Warfare component, exploring its role in offensive cyber operations. From deciphering programming languages, tools, and frameworks to practical insights on setting up your own malware lab, this book equips readers with hands-on knowledge. The subsequent chapters will immerse you in the world of proof-of-concept evasive malware and master the art of evasive adversarial tradecraft. Concluding with a forward-looking perspective, the book explores emerging threats and trends, making it an essential read for anyone passionate about understanding and navigating the complex terrain of cyber conflicts.
- Contents:
- Intro
- Cover Page
- Title Page
- Copyright Page
- Dedication Page
- About the Author
- About the Technical Reviewer
- Acknowledgements
- Preface
- Errata
- Table of Contents
- 1. History of Cyber Conflicts
- Introduction
- Structure
- The Jester (2010-2016)
- Anonymous and Sabu (from 2003 to Present)
- Christopher Rennie Glenn (2003-2014)
- David Kee Crees, AKA "DR32" and "Abdilo" and "Gray Hat Mafia's Bitch" (2014-2021)
- SolarWinds Breach (2020)
- ProxyLogon/Hafnium/APT-40/Microsoft Exchange Server Mass Exploitation (2021)
- Albert Gonzalez, Shadowcrew, and Heartland Payment Systems (1995-2008)
- Kevin Mitnick (1963-2023)
- The Simplest Vendor Bypass Ever Done
- Conclusion
- References
- 2. Notable Threats and Trends
- Data Collection, Data Brokers, and Abuse of Commercially Available Intelligence by Adversaries
- Misinformation
- The Shift from Vendor Cooperation to In-House Malware Cooperation
- Proliferation of Malicious AI and Machine Learning Attacks
- Grim Predictions on the Future of Tech Job Security and How to Adapt
- Suggestions
- 3. Operational Security Successes and Failures
- Changing Attribution of Nation-State Threat Actors
- Shifts in Bulletproof Hosting Trends and Using Warrant Canaries
- Evidence Destruction with LUKS (Kali Linux Only)
- Evidence Destruction with LUKS (Hands-On, Distro Agnostic)
- Introduction to Shufflecake for Personal Device Encryption
- NukeMyLUKS - Original
- The Case Study of Paras Jha and the Mirai Botnet Creators
- Surveillance
- The Re-emergence of Wireless Hacking
- Personal Story: Dmitry Zhuravlev, Leaker of VMProtect
- 4. The Information Warfare Component
- Founding Fathers.
- Daniel M. Kelley and Cybersecurity &
- Growth
- Twitter/X "Disappears" All Media and Links from 2011 to 2014
- Clandestine Cell Systems
- Usage of the Clandestine Cell System in Resistance Groups, the Military, and Law Enforcement
- Cambridge Analytica Scandal and "Psychological Weapons" of Social Media
- Enhanced Interrogation Techniques
- Politics, Dictators, and Useful Idiots
- Splinternets
- Exercise of Sharp Power by Adversarial Information Warfare Campaigns
- Perceptions of Cyber Attacks by Russia in the 2022 Conflict
- Wrapping Up
- 5. Programming Languages, Tools, and Frameworks
- C/C++
- Go
- Rust
- Nim
- Fileless Malware
- C#, .NET, and Powershell
- Python
- Frameworks
- 6. Setting Up Your Malware Lab
- SSL-Pinning, Windows Error Reporting, and False Alerts
- The Target Box
- Configuring SecurityOnion
- Configuring Sysmon 15
- Configuring Wazuh Agents
- The Malware Development Box
- DefenderCheck
- WDExtract
- GHIDRA + Amazon Corretto
- PE-Sieve, PE-Bear, Mal-Unpack
- Intel PIN and TinyTracer
- X32dbg/x64dbg
- SysInternals, Process Hacker 2, API Monitor, sRDI
- Configuring Windows Debugger and Debuggees for Malicious Driver Development
- Squid SSL-Bumping to Monitor Telemetry Communications
- Squid Proxy On Your Host
- Intercepted Windows VM Guest (Target Box)
- Squid Proxy On Your Host: Part 2
- 7. Proof-of-Concept Evasive Malware
- The Main Implant
- Shellcode Runner
- Producing Encrypted Shellcode
- Sysmon Finders
- Sysmon Killers
- Eventlog Tracing for Windows Patching
- Eventlog Tracing for Windows Thread Locking
- Memory Evasion Shellcode from Havoc
- Command-Line Obfuscation
- Scantime Detection Evasion.
- Rootkit Installer
- Rootkit Usage
- Testing Our Payload
- 8. Evasive Adversarial Tradecraft
- Obfuscation Principles
- Threat Actor Attack Chains
- Forensic Evasion
- Detection Evasion
- Network Evasion
- 9. Emerging Threats and Trends
- Data Brokers: A National Security Threat
- How Data Collection, Data Breaches, and Insider Threats Create an Underground Economy
- Cyber Mercenaries
- Banks Discriminating Against Customers and Closing Their Accounts
- The Politicization of Not Just Science, but STEM
- Labor Abuse in Infosec and Tech
- Dangerous Politics
- AI Issues
- Government Surveillance, Fight to Preserve Section 702, and Abuses of the Surveillance Capitalism Apparatus by Private and Public Parties
- Electronics Sanctions and Bans
- The Brutal World of Cybercrime
- Fast Exploitation of Reported Vulnerabilities
- Splinternet Attacks
- Being an Influencer Can Be Bad for Your Health
- Index.
- Notes:
- Description based on publisher supplied metadata and other sources.
- Description based on print version record.
- Includes bibliographical references and index.
- Other Format:
- Print version: Tan, Chang Ultimate Cyberwarfare for Evasive Cyber Tactics
- ISBN:
- 9788196890315
- 8196890311
- OCLC:
- 1420626975
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.