Archive for Attack Methodology

You are browsing the archives of Attack Methodology.

Cracking Stuxnet, a 21st-century cyber weapon

Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon – [ted.com] About this talk When first discovered in 2010, the Stuxnet computer worm posed a baffling puzzle. Beyond its unusually high level of sophistication loomed a more troubling mystery: its purpose. Ralph Langner and team helped crack the code that revealed this digital warhead’s final target […]

Cyberwar Defined

War is violent conflict on a large scale, often involving organizations on a national scale. There are many different forms of war and many different levels. We use the terms; civil, conventional, nuclear, chemical, biological, guerilla, asymmetric, urban, jungle, naval, air, desert, trench, psychological, cold and more to describe types of war. A “cold” war […]

Security Controls – Tools for Your Gameplan

FOOTBALL In football (and other sports) the gameplan is an important part of success. How well the gameplan is implemented on the field will determine the final score, but with a flawed gameplan, performance may become irrelevant. Football organizations may use groups of scouts and coaches and spend weeks performing an analysis of their upcoming […]

Agile Defense with NIST Controls

Agile Defense In the past, information systems security often focused simply on perimeter defense, wrongly assuming that a strong perimeter was the only defense needed. Then, as regulations became more complex and more legal, infosec became more “compliance-centric”, trying to pass the security audits required by law. Compliance oriented security produces reams of paperwork and […]

PRC Cyber Capabilities Study

A report prepared by Northrop Grumman on Chinese capability to wage information warfare offers some valuable insights into the nature of professional and national security cyber-attack teams. REPORT ON CHINESE CYBER WARFARE & ESPIONAGE – [uscc.gov] “Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation” Prepared for The US-China […]

APT (more)

A new paper that discussed Advanced Persistent Threat (APT) has been released by Mandiant and has sparked new interest in the topic. excerpt from the original post on APT APT or Advanced Persistent Threat describes cyber attacks mounted by organizational teams that have deep resources, advanced penetration skills, specific target profiles and are remarkably persisent […]

CCDC videos

CCDC Documentary Preview CyberWATCH YouTube channel with videos shot and edited from the 2009 CCDC hacker versus students competition Other CCDC related posts

Malware Evolution

This thoroughly researched paper by Dave Dittrich at the University of Washington, reflects on how malware and cyber criminals have evolved their techniques and activites over recent years. Hybrid combinations of penetration methods make it more difficult to defend against the malware and good use of social engineering increases the success percentage. Nugache in fact […]

Advanced Persistent Threat

APT or Advanced Persistent Threat describes cyber attacks mounted by organizational teams that have deep resources, advanced penetration skills, specific target profiles and are remarkably persisent in their efforts. They tend to use sophisticated custom malware that can circumvent most defenses, stealthy tactics and demonstrate good situational awareness by evaluating defenders responses and escalating their […]

Physical attacks

Physical attacks

Physical attacks are attacks that involve penetrating the physical security protecting information systems. In a facility with low physical security or public access, it can be as simple as walking into a building and sitting down at a computer system. Here is a list of some of the types of physical attacks: Walk-in – where […]