Siêu thị PDFTải ngay đi em, trời tối mất

Thư viện tri thức trực tuyến

Kho tài liệu với 50,000+ tài liệu học thuật

© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

Cyber Warfare Techniques, Tactics and Tools for Security Practitioners
PREMIUM
Số trang
321
Kích thước
2.9 MB
Định dạng
PDF
Lượt xem
1562

Cyber Warfare Techniques, Tactics and Tools for Security Practitioners

Nội dung xem thử

Mô tả chi tiết

Cyber Warfare

This page intentionally left blank

Cyber Warfare

Techniques, Tactics and Tools

for Security Practitioners

Jason Andress

Steve Winterfeld

Russ Rogers, Technical Editor

Foreword by Stephen Northcutt

AMSTERDAM • BOSTON • HEIDELBERG • LONDON

NEW YORK • OXFORD • PARIS • SAN DIEGO

SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO

Syngress is an imprint of Elsevier

Acquiring Editor: Angelina Ward

Development Editor: Matthew Cater

Project Manager: Paul Gottehrer

Designer: Kristen Davis

Syngress is an imprint of Elsevier

225 Wyman Street, Waltham, MA 02451, USA

© 2011 Elsevier, Inc. All rights reserved.

No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including

photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details

on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations

such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/

permissions.

This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted

herein).

Notices

Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding,

changes in research methods or professional practices, may become necessary. Practitioners and researchers must always rely on

their own experience and knowledge in evaluating and using any information or methods described herein. In using such information

or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional

responsibility.

To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury

and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any

methods, products, instructions, or ideas contained in the material herein.

Library of Congress Cataloging-in-Publication Data

Andress, Jason.

Cyber warfare : techniques, tactics and tools for security practitioners / Jason Andress, Steve

Winterfeld ; Russ Rogers, technical editor ; foreword by Stephen Northcutt.

p. cm.

Includes bibliographical references and index.

ISBN 978-1-59749-637-7 (alk. paper)

1. Information warfare—Handbooks, manuals, etc. 2. Computer networks—Security

measures—Handbooks, manuals, etc. I. Winterfeld, Steve. II. Rogers, Russ. III. Title.

U163.A64 2011

355.3'43—dc23

2011019780

British Library Cataloguing-in-Publication Data

A catalogue record for this book is available from the British Library.

ISBN: 978-1-59749-637-7

Printed in the United States of America

11 12 13 14 15 10 9 8 7 6 5 4 3 2 1

Typeset by: diacriTech, India

For information on all Syngress publications visit our website at www.syngress.com

v

Acknowledgments

Jason Andress and Steve Winterfeld

We thank our families and friends for their guidance, support, and fortitude through￾out this project. We dedicate this book to those in the security industry who are

making the world a better place through efforts like Hackers for Charity (You may

have seen their T-shirts—“i hack charities.” For more information, go to http://

hackersforcharity.org/). To those who are not we say—get engaged!

Russ Rogers

Russ would like to thank his children, his father, and Tracie for being so supportive

over the years. Thanks and shout outs go out to Chris Hurley, Mark Carey, Rob

Bathurst, Pushpin, Paul Criscuolo, Ping Look, Greg Miles, Ryan Clarke, Luke

McOmie, Curtis Letson, and Eddie Mize.

This page intentionally left blank

vii

Contents

Acknowledgments......................................................................................................v

About the Authors....................................................................................................xv

About the Technical Editor....................................................................................xvii

Foreword .................................................................................................................xix

Introduction...........................................................................................................xxiii

Chapter 1 What is Cyber Warfare?........................................................... 1

What is Cyber Warfare? ..................................................................1

Definition for Cyber Warfare......................................................2

Tactical and Operational Reasons for Cyber War ......................4

Cyber Strategy and Power ..........................................................5

Cyber Arms Control ...................................................................7

What is the United States Doing About the Threat of a

Cyber War? .................................................................................9

Have We Seen a Cyber War?.........................................................12

Case Studies .............................................................................13

The Debate (Is it Real?)............................................................15

Why Cyber Warfare is Important..................................................15

Summary .......................................................................................16

Endnotes........................................................................................17

Chapter 2 The Cyberspace Battlefield.................................................... 19

Boundaries in Cyber Warfare........................................................19

Defense in Depth ......................................................................20

Physical Infrastructure ..............................................................21

Organizational View .................................................................22

Where Cyber Fits in the War-fighting Domains............................26

Land ..........................................................................................26

Sea ............................................................................................27

Air .............................................................................................27

Space ........................................................................................28

Cyber Domain ..........................................................................28

Threatscape ...................................................................................29

Most Active Threats .................................................................29

Most Dangerous Threats ..........................................................30

Motivations ...............................................................................32

Fielding Systems at the Speed of Need.........................................34

Summary .......................................................................................35

Endnotes........................................................................................36

viii Contents

Chapter 3 Cyber Doctrine...................................................................... 37

Current U.S. Doctrine ...................................................................37

U.S. Forces ...............................................................................39

U.S. Air Force ..........................................................................39

U.S. Navy .................................................................................40

U.S. Army ................................................................................40

DoD INFOCONs ......................................................................41

Sample Doctrine/Strategy from Around the World.......................43

Chinese Doctrine ......................................................................43

Other Key Nations Developing Doctrine .................................44

Translating Traditional Military Doctrine.....................................46

IPOE .........................................................................................46

JMEM .......................................................................................47

MOE .........................................................................................47

BDA ..........................................................................................48

CAS ..........................................................................................48

COIN ........................................................................................48

Guidance and Directives ...............................................................49

CNCI ........................................................................................49

DHS ..........................................................................................49

HSPD ........................................................................................50

NIST .........................................................................................52

Academia and Industry Associations .......................................53

Operations and Exercises..............................................................54

Federal Exercises ......................................................................55

DoD Exercises ..........................................................................55

Educational Exercises ...............................................................56

Sample MESLs .........................................................................56

Summary .......................................................................................57

Endnotes........................................................................................57

Chapter 4 Cyber Warriors ..................................................................... 61

What Does a Cyber Warrior Look Like? ......................................61

Certifications ............................................................................62

Education and Training ............................................................63

Experience and Skills ...............................................................64

Differences from Traditional Forces.............................................66

Age ...........................................................................................66

Attitude .....................................................................................66

Physical Condition ...................................................................67

Credentials ................................................................................68

Contents ix

Present Cyber Warfare Forces.......................................................69

U.S. ...........................................................................................69

China ........................................................................................71

Russia .......................................................................................71

France .......................................................................................71

Israel .........................................................................................72

Brazil ........................................................................................72

Singapore ..................................................................................72

South Korea ..............................................................................72

North Korea ..............................................................................73

Australia ...................................................................................73

Malaysia ...................................................................................73

Japan .........................................................................................73

Canada ......................................................................................74

United Kingdom .......................................................................74

Other Countries with Cyber Forces ..........................................74

Corporate ..................................................................................74

Criminal ....................................................................................75

Staffing for Cyber War..................................................................76

Sources of Talent ......................................................................76

Training the Next Generation ...................................................77

Summary .......................................................................................80

Endnotes........................................................................................80

Chapter 5 Logical Weapons .................................................................. 83

Reconnaissance Tools ...................................................................84

General Information Gathering ................................................85

Whois .......................................................................................87

DNS ..........................................................................................88

Metadata ...................................................................................90

Maltego .....................................................................................93

Defense .....................................................................................94

Scanning Tools..............................................................................94

Nmap ........................................................................................95

Nessus .......................................................................................97

Defense ...................................................................................100

Access and Escalation Tools.......................................................100

Password Tools .......................................................................101

The Metasploit Project ...........................................................102

Immunity CANVAS ...............................................................104

Defense ...................................................................................105

x Contents

Exfiltration Tools.........................................................................106

Physical Exfiltration ...............................................................106

Encryption and Steganography ..............................................107

Using Common Protocols ......................................................107

Out of Band Methods .............................................................108

Defense ...................................................................................108

Sustainment Tools.......................................................................109

Adding “Authorized” Access .................................................109

Backdoors ...............................................................................109

Defense ...................................................................................110

Assault Tools...............................................................................110

Meddling with Software .........................................................110

Attacking Hardware ...............................................................112

Defense ...................................................................................113

Obfuscation Tools .......................................................................113

Location Obscuration .............................................................113

Log Manipulation ...................................................................114

File Manipulation ...................................................................115

Defense ...................................................................................116

Summary .....................................................................................117

Endnotes......................................................................................118

Chapter 6 Physical Weapons .............................................................. 119

How the Logical and Physical Realms are Connected................120

Logical Systems Run on Physical Hardware .........................120

Logical Attacks Can Have Physical Effects ...........................121

Infrastructure Concerns...............................................................122

What is SCADA? ...................................................................123

What Security Issues are Present in the World

of SCADA? ............................................................................124

What are the Consequences of SCADA Failures? .................125

Supply Chain Concerns...............................................................126

Compromised Hardware .........................................................126

Deliberately Corrupted Components ......................................127

Non-Technical Issues .............................................................128

Tools for Physical Attack and Defense .......................................128

Electromagnetic Attacks.........................................................129

Covert Activity .......................................................................132

Summary .....................................................................................136

Endnotes......................................................................................137

Contents xi

Chapter 7 Psychological Weapons ...................................................... 139

Social Engineering Explained.....................................................139

Is Social Engineering Science? ..............................................140

SE Tactics Techniques and Procedures (TTPs) ......................140

Types of SE Approaches ........................................................142

Types of SE Methodologies ...................................................143

How the Military Approaches Social Engineering .....................145

Army Doctrine ........................................................................146

How the Military Defends Against Social Engineering..............149

How the Army does CI ...........................................................151

An Air Force Approach ..........................................................151

Summary .....................................................................................152

Endnotes......................................................................................152

Chapter 8 Computer Network Exploitation............................................ 155

Intelligence and Counter-Intelligence .........................................156

Sources of Cyber Attacks .......................................................156

Attackers and Sponsors of Attacks .........................................157

Reconnaissance ...........................................................................157

Open Source Intelligence .......................................................157

Passive Reconnaissance ..........................................................159

Surveillance.................................................................................161

Justifications for Surveillance ................................................161

Advanced Persistent Threat ....................................................162

Voice Surveillance ..................................................................163

Data Surveillance ...................................................................163

Large-Scale Surveillance Programs .......................................164

Uses of Surveillance Data ......................................................165

Summary .....................................................................................165

Endnotes......................................................................................166

Chapter 9 Computer Network Attack.................................................... 167

Waging War in the Cyber Era......................................................168

Physically ...............................................................................168

Electronically..........................................................................168

Logically .................................................................................169

Reactively vs. Proactively ......................................................169

Time as a Factor .....................................................................170

The Attack Process......................................................................170

Recon ......................................................................................171

Scan ........................................................................................172

xii Contents

Access .....................................................................................173

Escalate ...................................................................................174

Exfiltrate .................................................................................174

Assault ....................................................................................175

Sustain ....................................................................................177

Obfuscate ................................................................................177

Summary .....................................................................................178

Endnotes......................................................................................178

Chapter 10 Computer Network Defense ................................................. 179

What We Protect..........................................................................180

Confidentiality, Integrity, Availability ....................................181

Authenticate, Authorize, and Audit ........................................182

Security Awareness and Training................................................183

Awareness ...............................................................................184

Training ..................................................................................185

Defending against Cyber Attacks................................................185

Policy and Compliance ...........................................................186

Surveillance, Data Mining, and Pattern Matching .................187

Intrusion Detection and Prevention ........................................187

Vulnerability Assessment and Penetration Testing ................188

Disaster Recovery Planning ...................................................188

Defense in Depth ....................................................................189

Summary .....................................................................................190

Endnotes......................................................................................191

Chapter 11 Non-State Actors in Computer Network Operations................ 193

Individual Actors.........................................................................194

Script Kiddies .........................................................................195

Malware Authors ....................................................................195

Scammers ...............................................................................196

Blackhats ................................................................................196

Hacktivists ..............................................................................197

Patriot Hackers .......................................................................197

Corporations................................................................................197

Motivation for Corporations to Act in Cyber Warfare ...........198

Cyber Terrorism ..........................................................................198

Reasons for Cyber Terrorist Attacks ......................................199

What Will Happen When We See a Cyber Terrorist Attack? ..199

Organized Cyber Crime ..............................................................201

Motivations for Criminal Organizations .................................201

Contents xiii

Autonomous Actors ....................................................................202

Exploratory Systems ..............................................................202

Attack Systems .......................................................................203

Defensive Systems ..................................................................204

Summary .....................................................................................205

Endnotes......................................................................................206

Chapter 12 Legal System Impacts ......................................................... 207

Legal Systems .............................................................................209

International............................................................................210

United States Laws .................................................................211

Criminal Law ..........................................................................212

Key U.S. Laws.............................................................................213

International Trafficking in Arms Regulations .......................214

U.S. Cyber Related Laws .......................................................214

Privacy Impacts...........................................................................218

Electronic Communications Privacy Act ...............................218

Digital Forensics .........................................................................219

Certification ............................................................................221

Summary .....................................................................................222

Endnotes......................................................................................222

Chapter 13 Ethics ................................................................................ 225

Ethics in Cyber Warfare ..............................................................226

Use of Force ...........................................................................226

Intent .......................................................................................227

Secrecy ...................................................................................227

Attribution ..............................................................................227

Military Ethics ........................................................................227

Bellum Iustum (Just War Theory)...............................................228

Jus ad Bellum (The Right to Wage War) ................................230

Jus in Bello (Proper Conduct in War) ....................................232

Jus Post Bellum (Justice after War) ........................................234

Summary .....................................................................................235

Endnotes......................................................................................236

Chapter 14 Cyberspace Challenges....................................................... 239

Cybersecurity Issues Defined......................................................240

Policy ......................................................................................241

Processes ................................................................................242

Technical ................................................................................243

xiv Contents

Skills .......................................................................................247

People .....................................................................................247

Organization ...........................................................................249

Core (Impacting All Areas) ....................................................249

Interrelationship of Cybersecurity Issues....................................252

Way Ahead ..................................................................................254

Summary .....................................................................................255

Endnotes......................................................................................256

Chapter 15 The Future of Cyber War...................................................... 257

Near Term Trends........................................................................263

Most Likely and Most Dangerous Courses of Action.................266

New Technologies and New Problems........................................268

International Interactions ............................................................270

Summary .....................................................................................271

Endnotes......................................................................................271

Appendix: Cyber Timeline............................................................................ 273

Index .......................................................................................................... 277

Tải ngay đi em, còn do dự, trời tối mất!