Counter Defense


Stealth techniques can aid an attacker in a variety of ways: Concealing a presence on a system Concealing command and control channels Concealing information gathering Concealing data exfiltration Stealth techniques are usually used in two primary categories: Root kits Hidden files – this includes both program related files and data files and often an entire […]

Situational Awareness

Situational awareness involves knowing where you are, and what is going on around you. For an attacker, figuring out where you are might seem to be a simple task, but it can be made more difficult by a variety of factors. Finding out what is going on around you can be much more difficult. Normal […]

OODA Loops

Background – OODA loops are an abstract description of the flow involved in conflict cycles, as described by Col. John Boyd of the US Air Force. He developed the theory while flying fighter planes in dog fights, but later generalized it to apply to any form of conflict. OODA stands for Observe, Orient, Decide, Act. […]

Defending Against APT

Advanced Persistent Threat (APT) is a cyber attack threat that typically comes from a team of attackers with advanced penetration skills, deep resources, specific target profiles and they tend to be very persistent in their efforts. They often have tools that are capable of circumventing defenses. They use stealthy tactics and show good situational awareness […]