Anatomy of a cyberattack

Type
Book
Authors
NIEMELÄ ( Mikko )
 
ISBN 10
1483562093 
ISBN 13
9781483562094 
Category
363-Social Services and Problems  [ Browse Items ]
Publication Year
2016 
Publisher
Pages
200 
Subject
Cyber Crime  
Description
They have the power to destroy lives, shut down businesses, and affect every one of us all around the world. They always come unannounced and you hear about them every day. Cyberattacks. The plague of today's technology-reliant world. Many consider cyberattacks pure computer magic; something too complicated to comprehend. But let me assure you, it's definitely not magic. Cyberattacks do, however, require a certain level of intelligence and computer knowledge. That's why the only way to successfully defend yourself against a cyberattack, is to learn and understand its anatomy. In this book, I explain how a cyberattack looks like from a hacker's perspective so that in case he picks you as his next victim, you're not going to be vulnerable and defenceless. - from Amzon 
Biblio Notes
Table of Contents
Anatomy of a Cyberattack.................................................................... P. 3
48 Hours P. 5
Targeting the Supply chain Databases ...................................................P. 10
Top 5 Clients ......................................................................................P. 12
Top 5 Suppliers ...................................................................................P. 12
Key Persons ........................................................................................P. 12
The First Fortress .................................................................................P. 15
Admin Rights .......................................................................................P. 18
Breaking Insider’s Trust ........................................................................P. 19
The Second Objective Access to Key Person’s e-mail .................................P. 20
Elaine you’ve got New invites Waiting for you ...........................................P. 21
Phase 1: Reconnaissance .......................................................................P. 24
Boring is Dangerous ..............................................................................P. 25
Follow the Tracks ..................................................................................P. 25
A Hacker begins to Draw a Map ...............................................................P. 26
Watch out for those Job Advertisements ...................................................P. 26
Intranet- World’s most Common name for Intranet ....................................P. 27
Where you go I’ii be watching you – Telecommuting .................................P. 28
Way to a Man’s Heart is through his Wifi ...................................................P. 29
Backing up your Mistakes .......................................................................P. 32
Source Code tall Tales ............................................................................P. 33
Do not give away access right in the Code .................................................P. 34
History Repeats itself. ............................................................................P. 35
Hack Naked ..........................................................................................P. 37
Phase 2: Scanning ..................................................................................P. 39
Knocking on your Ports ............................................................................P. 40
B-grade Student ......................................................................................P. 43
The sea of Wifi ........................................................................................P. 44
Tracerouting to Crown Jewels ...................................................................P. 48
Working up the Computer Controlling the most Critical Systems SCADA .........P. 50
Don’t Trust that Windows XP ....................................................................P. 52
A Hacker Stops a Wind form with a Single e-mail .......................................P. 54
Webspy: reveals the secret Surfing of the Executives ................................P. 55
Magic of the Probability Guesser ...............................................................P. 57
Legal Status of Scanning .........................................................................p. 58
Water Resistant Cybersecurity .................................................................P. 59
Phase 3 Exploiting .................................................................................P. 61
3-1 Equals Access to your Computer .........................................................P. 61
Social Engineering ..................................................................................P. 61
Knowledge from the Reconnaissance Phase ...............................................P. 62
Spam Messages ....................................................................................P. 62
Phishing ...............................................................................................P. 62
Watch out for Linkedin and Twitter ..........................................................P. 64
It’s all about getting your Trust ..............................................................P. 65
Beware of Fake Apps ............................................................................P. 66
Fax is old School, and Hackers Trust Old School .......................................P. 67
One e-mail Gains Access to Company’s Treasure ......................................P. 69
I Know your Password. Now all I need is your Username ...........................P. 70
How do Hackers Learn about our Username and Password Habits? ..............P. 71
Getting the Password ............................................................................P. 74
Breaking the Password ............................................................................P. 74
Salted Password Hashing .........................................................................P. 75
How to get yourself a Good Passwords .......................................................P. 76
Denial of Service at the Past Office ............................................................P. 78
DDOS the Money-Maker ..........................................................................P. 81
Always cut the Middle man out Feigned elections .........................................P. 84
Phase 4: Maintaining Access ......................................................................p. 87
Knock Knock – its me ...............................................................................P. 87
Watching through Fake Binoculars ..............................................................P. 90
Phase 5: Covering Tracks ..........................................................................P. 94
The Dark Alleys of the Internet ..................................................................P. 94
Dark Marketplaces ...................................................................................P. 95
We all have our History ............................................................................P. 97
Anti-Antivirus ........................................................................................P. 100
Cover Channels – When Normal Internet Tools become Dangerous ...............P. 105
 
Number of Copies

REVIEWS (0) -

No reviews posted yet.

WRITE A REVIEW

Please login to write a review.