Reverse Deception: Organized Cyber Threat Counter-Exploitation (134 page)

Read Reverse Deception: Organized Cyber Threat Counter-Exploitation Online

Authors: Sean Bodmer

Tags: #General, #security, #Computers

BOOK: Reverse Deception: Organized Cyber Threat Counter-Exploitation
7.66Mb size Format: txt, pdf, ePub
titles
TLD (Top-Level Domain)
tools.
See also
tactics
        academic research abuse
        analysis detection
        antivirus
        circles of trust
        conclusion
        considerations
        deception technologies
        detection technologies
        digital forensics
        firewalls
        honeypots.
See
honeypots
        host-based detection
        injection vectors
        intrusion detection systems
        intrusion prevention systems
        investigative
        network-based detection
        overview
        password hacking
        security management
        server/host vulnerability
        tailored valid services
        traffic capture
        used by criminals
Tools, Tactics, and Procedures (TTP)
Top-Level Domain (TLD)
Total Information Awareness (TIA)
Total Protection for Endpoint
tradecraft.
See also
threats
trademarks
traffic analysis
traffic capture tools
Tribe.net
website
Trojan Hydraq
Trojans
        hidden
        malicious loaders
        Remote Access Trojan
        Sinowal Trojan
        Trojan Hydraq
        Zeus Trojan
truth
TTP (Tools, Tactics, and Procedures)
tuned honeypots
Turvey, Brent
Twitter
Tzu, Sun

U

UGC (user-generated content)
underground forums
United States
universal resource identifiers (URIs)
universal resource locators (URLs)
Universal Time Clock (UTC)
Unix wizards
URIs (universal resource identifiers)
URLs (universal resource locators)
US Army Forces Command (FORSCOM)
US Computer Emergency Readiness Team (US-CERT)
US Cyber Command (USCYBERCOM)
USB thumb drives
US-CERT (US Computer Emergency Readiness Team)
USCYBERCOM (US Cyber Command)
user-generated content (UGC)
usernames
UTC (Universal Time Clock)

V

validating operations
Value Network Analysis (VNA)
value networks
vectors
        evolution of
        geolocation
        infection
        information
        injection
        levels of information in
        profiling.
See
profiling vectors
        social communications/connections
        summary
        tactics
        temporal
        weapons
vertical phishing
vetting
        deceptions
        engagements
        importance of
        perpetual consistency
ViCheck.ca
website
victimology
victims
        analyzing
        psychological autopsy
        relationship to offender
        timeline
        weapons used on
violent criminals
virtual deception
virtual economies
Virtual Machine Manager (VMM)
virtual machines (VMs)
Virtual Private Network (VPN)
virtual property
VirusTotal website
VMM (Virtual Machine Manager)
VMs (virtual machines)
VNA (Value Network Analysis)
von Clausewitz, Carl
VPN (Virtual Private Network)
vulnerabilities
        analyzing
        applications
        CnC back end
        considerations
        defined
        host/server
        multiple
        proprietary software
        Windows operating system

W

WarmTouch system
warnings
weapon vector
weapons
WebMonitor tool
Webopedia
websites
        analyzing
        cause-motivated attacks
        crawling
        defacements
        exploit kits
        fake
        government
        hacked
        high-volume
        legal
        malicious
        military
        of potential offenders
        social networking.
See
social networks
        underground forums
Wepawet website
whaling
whitelists
WikiLeaks
Wikipedia
Wildersecurity website
Windows operating system
wireless devices
wireless networks
Wireshark tool
wizards
writing skills

Y

YGN Ethical Hacker Group

Z

Other books

Night of Demons - 02 by Tony Richards
Weirdo by Cathi Unsworth
Tempted by Rebecca Zanetti
Sunwing by Kenneth Oppel
Earthworks by Brian W. Aldiss
London Folk Tales by Helen East
Dead Waters by Anton Strout