My Account Log in

2 options

Ultimate Cyberwarfare for Evasive Cyber Tactics / Chang Tan.

EBSCOhost Academic eBook Collection (North America) Available online

View online

Ebook Central College Complete Available online

View online
Format:
Book
Author/Creator:
Tan, Chang, author.
Language:
English
Subjects (All):
Programming languages (Electronic computers).
Physical Description:
1 online resource (278 pages)
Edition:
First edition.
Place of Publication:
Delhi : Orange Education Pvt Ltd, [2024]
Summary:
The "Ultimate Cyberwarfare for Evasive Cyber Tactic" is an all-encompassing guide, meticulously unfolding across pivotal cybersecurity domains, providing a thorough overview of cyber warfare.The book begins by unraveling the tapestry of today's cyber landscape, exploring current threats, implementation strategies, and notable trends. From operational security triumphs to poignant case studies of failures, readers gain valuable insights through real-world case studies. The book delves into the force-multiplying potential of the Information Warfare component, exploring its role in offensive cyber operations. From deciphering programming languages, tools, and frameworks to practical insights on setting up your own malware lab, this book equips readers with hands-on knowledge. The subsequent chapters will immerse you in the world of proof-of-concept evasive malware and master the art of evasive adversarial tradecraft. Concluding with a forward-looking perspective, the book explores emerging threats and trends, making it an essential read for anyone passionate about understanding and navigating the complex terrain of cyber conflicts.
Contents:
Intro
Cover Page
Title Page
Copyright Page
Dedication Page
About the Author
About the Technical Reviewer
Acknowledgements
Preface
Errata
Table of Contents
1. History of Cyber Conflicts
Introduction
Structure
The Jester (2010-2016)
Anonymous and Sabu (from 2003 to Present)
Christopher Rennie Glenn (2003-2014)
David Kee Crees, AKA "DR32" and "Abdilo" and "Gray Hat Mafia's Bitch" (2014-2021)
SolarWinds Breach (2020)
ProxyLogon/Hafnium/APT-40/Microsoft Exchange Server Mass Exploitation (2021)
Albert Gonzalez, Shadowcrew, and Heartland Payment Systems (1995-2008)
Kevin Mitnick (1963-2023)
The Simplest Vendor Bypass Ever Done
Conclusion
References
2. Notable Threats and Trends
Data Collection, Data Brokers, and Abuse of Commercially Available Intelligence by Adversaries
Misinformation
The Shift from Vendor Cooperation to In-House Malware Cooperation
Proliferation of Malicious AI and Machine Learning Attacks
Grim Predictions on the Future of Tech Job Security and How to Adapt
Suggestions
3. Operational Security Successes and Failures
Changing Attribution of Nation-State Threat Actors
Shifts in Bulletproof Hosting Trends and Using Warrant Canaries
Evidence Destruction with LUKS (Kali Linux Only)
Evidence Destruction with LUKS (Hands-On, Distro Agnostic)
Introduction to Shufflecake for Personal Device Encryption
NukeMyLUKS - Original
The Case Study of Paras Jha and the Mirai Botnet Creators
Surveillance
The Re-emergence of Wireless Hacking
Personal Story: Dmitry Zhuravlev, Leaker of VMProtect
4. The Information Warfare Component
Founding Fathers.
Daniel M. Kelley and Cybersecurity &amp
Growth
Twitter/X "Disappears" All Media and Links from 2011 to 2014
Clandestine Cell Systems
Usage of the Clandestine Cell System in Resistance Groups, the Military, and Law Enforcement
Cambridge Analytica Scandal and "Psychological Weapons" of Social Media
Enhanced Interrogation Techniques
Politics, Dictators, and Useful Idiots
Splinternets
Exercise of Sharp Power by Adversarial Information Warfare Campaigns
Perceptions of Cyber Attacks by Russia in the 2022 Conflict
Wrapping Up
5. Programming Languages, Tools, and Frameworks
C/C++
Go
Rust
Nim
Fileless Malware
C#, .NET, and Powershell
Python
Frameworks
6. Setting Up Your Malware Lab
SSL-Pinning, Windows Error Reporting, and False Alerts
The Target Box
Configuring SecurityOnion
Configuring Sysmon 15
Configuring Wazuh Agents
The Malware Development Box
DefenderCheck
WDExtract
GHIDRA + Amazon Corretto
PE-Sieve, PE-Bear, Mal-Unpack
Intel PIN and TinyTracer
X32dbg/x64dbg
SysInternals, Process Hacker 2, API Monitor, sRDI
Configuring Windows Debugger and Debuggees for Malicious Driver Development
Squid SSL-Bumping to Monitor Telemetry Communications
Squid Proxy On Your Host
Intercepted Windows VM Guest (Target Box)
Squid Proxy On Your Host: Part 2
7. Proof-of-Concept Evasive Malware
The Main Implant
Shellcode Runner
Producing Encrypted Shellcode
Sysmon Finders
Sysmon Killers
Eventlog Tracing for Windows Patching
Eventlog Tracing for Windows Thread Locking
Memory Evasion Shellcode from Havoc
Command-Line Obfuscation
Scantime Detection Evasion.
Rootkit Installer
Rootkit Usage
Testing Our Payload
8. Evasive Adversarial Tradecraft
Obfuscation Principles
Threat Actor Attack Chains
Forensic Evasion
Detection Evasion
Network Evasion
9. Emerging Threats and Trends
Data Brokers: A National Security Threat
How Data Collection, Data Breaches, and Insider Threats Create an Underground Economy
Cyber Mercenaries
Banks Discriminating Against Customers and Closing Their Accounts
The Politicization of Not Just Science, but STEM
Labor Abuse in Infosec and Tech
Dangerous Politics
AI Issues
Government Surveillance, Fight to Preserve Section 702, and Abuses of the Surveillance Capitalism Apparatus by Private and Public Parties
Electronics Sanctions and Bans
The Brutal World of Cybercrime
Fast Exploitation of Reported Vulnerabilities
Splinternet Attacks
Being an Influencer Can Be Bad for Your Health
Index.
Notes:
Description based on publisher supplied metadata and other sources.
Description based on print version record.
Includes bibliographical references and index.
Other Format:
Print version: Tan, Chang Ultimate Cyberwarfare for Evasive Cyber Tactics
ISBN:
9788196890315
8196890311
OCLC:
1420626975

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account