Thư viện tri thức trực tuyến
Kho tài liệu với 50,000+ tài liệu học thuật
© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

Cyber Warfare Techniques, Tactics and Tools for Security Practitioners
Nội dung xem thử
Mô tả chi tiết
Cyber Warfare
This page intentionally left blank
Cyber Warfare
Techniques, Tactics and Tools
for Security Practitioners
Jason Andress
Steve Winterfeld
Russ Rogers, Technical Editor
Foreword by Stephen Northcutt
AMSTERDAM • BOSTON • HEIDELBERG • LONDON
NEW YORK • OXFORD • PARIS • SAN DIEGO
SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO
Syngress is an imprint of Elsevier
Acquiring Editor: Angelina Ward
Development Editor: Matthew Cater
Project Manager: Paul Gottehrer
Designer: Kristen Davis
Syngress is an imprint of Elsevier
225 Wyman Street, Waltham, MA 02451, USA
© 2011 Elsevier, Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details
on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations
such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/
permissions.
This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted
herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding,
changes in research methods or professional practices, may become necessary. Practitioners and researchers must always rely on
their own experience and knowledge in evaluating and using any information or methods described herein. In using such information
or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional
responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury
and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any
methods, products, instructions, or ideas contained in the material herein.
Library of Congress Cataloging-in-Publication Data
Andress, Jason.
Cyber warfare : techniques, tactics and tools for security practitioners / Jason Andress, Steve
Winterfeld ; Russ Rogers, technical editor ; foreword by Stephen Northcutt.
p. cm.
Includes bibliographical references and index.
ISBN 978-1-59749-637-7 (alk. paper)
1. Information warfare—Handbooks, manuals, etc. 2. Computer networks—Security
measures—Handbooks, manuals, etc. I. Winterfeld, Steve. II. Rogers, Russ. III. Title.
U163.A64 2011
355.3'43—dc23
2011019780
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library.
ISBN: 978-1-59749-637-7
Printed in the United States of America
11 12 13 14 15 10 9 8 7 6 5 4 3 2 1
Typeset by: diacriTech, India
For information on all Syngress publications visit our website at www.syngress.com
v
Acknowledgments
Jason Andress and Steve Winterfeld
We thank our families and friends for their guidance, support, and fortitude throughout this project. We dedicate this book to those in the security industry who are
making the world a better place through efforts like Hackers for Charity (You may
have seen their T-shirts—“i hack charities.” For more information, go to http://
hackersforcharity.org/). To those who are not we say—get engaged!
Russ Rogers
Russ would like to thank his children, his father, and Tracie for being so supportive
over the years. Thanks and shout outs go out to Chris Hurley, Mark Carey, Rob
Bathurst, Pushpin, Paul Criscuolo, Ping Look, Greg Miles, Ryan Clarke, Luke
McOmie, Curtis Letson, and Eddie Mize.
This page intentionally left blank
vii
Contents
Acknowledgments......................................................................................................v
About the Authors....................................................................................................xv
About the Technical Editor....................................................................................xvii
Foreword .................................................................................................................xix
Introduction...........................................................................................................xxiii
Chapter 1 What is Cyber Warfare?........................................................... 1
What is Cyber Warfare? ..................................................................1
Definition for Cyber Warfare......................................................2
Tactical and Operational Reasons for Cyber War ......................4
Cyber Strategy and Power ..........................................................5
Cyber Arms Control ...................................................................7
What is the United States Doing About the Threat of a
Cyber War? .................................................................................9
Have We Seen a Cyber War?.........................................................12
Case Studies .............................................................................13
The Debate (Is it Real?)............................................................15
Why Cyber Warfare is Important..................................................15
Summary .......................................................................................16
Endnotes........................................................................................17
Chapter 2 The Cyberspace Battlefield.................................................... 19
Boundaries in Cyber Warfare........................................................19
Defense in Depth ......................................................................20
Physical Infrastructure ..............................................................21
Organizational View .................................................................22
Where Cyber Fits in the War-fighting Domains............................26
Land ..........................................................................................26
Sea ............................................................................................27
Air .............................................................................................27
Space ........................................................................................28
Cyber Domain ..........................................................................28
Threatscape ...................................................................................29
Most Active Threats .................................................................29
Most Dangerous Threats ..........................................................30
Motivations ...............................................................................32
Fielding Systems at the Speed of Need.........................................34
Summary .......................................................................................35
Endnotes........................................................................................36
viii Contents
Chapter 3 Cyber Doctrine...................................................................... 37
Current U.S. Doctrine ...................................................................37
U.S. Forces ...............................................................................39
U.S. Air Force ..........................................................................39
U.S. Navy .................................................................................40
U.S. Army ................................................................................40
DoD INFOCONs ......................................................................41
Sample Doctrine/Strategy from Around the World.......................43
Chinese Doctrine ......................................................................43
Other Key Nations Developing Doctrine .................................44
Translating Traditional Military Doctrine.....................................46
IPOE .........................................................................................46
JMEM .......................................................................................47
MOE .........................................................................................47
BDA ..........................................................................................48
CAS ..........................................................................................48
COIN ........................................................................................48
Guidance and Directives ...............................................................49
CNCI ........................................................................................49
DHS ..........................................................................................49
HSPD ........................................................................................50
NIST .........................................................................................52
Academia and Industry Associations .......................................53
Operations and Exercises..............................................................54
Federal Exercises ......................................................................55
DoD Exercises ..........................................................................55
Educational Exercises ...............................................................56
Sample MESLs .........................................................................56
Summary .......................................................................................57
Endnotes........................................................................................57
Chapter 4 Cyber Warriors ..................................................................... 61
What Does a Cyber Warrior Look Like? ......................................61
Certifications ............................................................................62
Education and Training ............................................................63
Experience and Skills ...............................................................64
Differences from Traditional Forces.............................................66
Age ...........................................................................................66
Attitude .....................................................................................66
Physical Condition ...................................................................67
Credentials ................................................................................68
Contents ix
Present Cyber Warfare Forces.......................................................69
U.S. ...........................................................................................69
China ........................................................................................71
Russia .......................................................................................71
France .......................................................................................71
Israel .........................................................................................72
Brazil ........................................................................................72
Singapore ..................................................................................72
South Korea ..............................................................................72
North Korea ..............................................................................73
Australia ...................................................................................73
Malaysia ...................................................................................73
Japan .........................................................................................73
Canada ......................................................................................74
United Kingdom .......................................................................74
Other Countries with Cyber Forces ..........................................74
Corporate ..................................................................................74
Criminal ....................................................................................75
Staffing for Cyber War..................................................................76
Sources of Talent ......................................................................76
Training the Next Generation ...................................................77
Summary .......................................................................................80
Endnotes........................................................................................80
Chapter 5 Logical Weapons .................................................................. 83
Reconnaissance Tools ...................................................................84
General Information Gathering ................................................85
Whois .......................................................................................87
DNS ..........................................................................................88
Metadata ...................................................................................90
Maltego .....................................................................................93
Defense .....................................................................................94
Scanning Tools..............................................................................94
Nmap ........................................................................................95
Nessus .......................................................................................97
Defense ...................................................................................100
Access and Escalation Tools.......................................................100
Password Tools .......................................................................101
The Metasploit Project ...........................................................102
Immunity CANVAS ...............................................................104
Defense ...................................................................................105
x Contents
Exfiltration Tools.........................................................................106
Physical Exfiltration ...............................................................106
Encryption and Steganography ..............................................107
Using Common Protocols ......................................................107
Out of Band Methods .............................................................108
Defense ...................................................................................108
Sustainment Tools.......................................................................109
Adding “Authorized” Access .................................................109
Backdoors ...............................................................................109
Defense ...................................................................................110
Assault Tools...............................................................................110
Meddling with Software .........................................................110
Attacking Hardware ...............................................................112
Defense ...................................................................................113
Obfuscation Tools .......................................................................113
Location Obscuration .............................................................113
Log Manipulation ...................................................................114
File Manipulation ...................................................................115
Defense ...................................................................................116
Summary .....................................................................................117
Endnotes......................................................................................118
Chapter 6 Physical Weapons .............................................................. 119
How the Logical and Physical Realms are Connected................120
Logical Systems Run on Physical Hardware .........................120
Logical Attacks Can Have Physical Effects ...........................121
Infrastructure Concerns...............................................................122
What is SCADA? ...................................................................123
What Security Issues are Present in the World
of SCADA? ............................................................................124
What are the Consequences of SCADA Failures? .................125
Supply Chain Concerns...............................................................126
Compromised Hardware .........................................................126
Deliberately Corrupted Components ......................................127
Non-Technical Issues .............................................................128
Tools for Physical Attack and Defense .......................................128
Electromagnetic Attacks.........................................................129
Covert Activity .......................................................................132
Summary .....................................................................................136
Endnotes......................................................................................137
Contents xi
Chapter 7 Psychological Weapons ...................................................... 139
Social Engineering Explained.....................................................139
Is Social Engineering Science? ..............................................140
SE Tactics Techniques and Procedures (TTPs) ......................140
Types of SE Approaches ........................................................142
Types of SE Methodologies ...................................................143
How the Military Approaches Social Engineering .....................145
Army Doctrine ........................................................................146
How the Military Defends Against Social Engineering..............149
How the Army does CI ...........................................................151
An Air Force Approach ..........................................................151
Summary .....................................................................................152
Endnotes......................................................................................152
Chapter 8 Computer Network Exploitation............................................ 155
Intelligence and Counter-Intelligence .........................................156
Sources of Cyber Attacks .......................................................156
Attackers and Sponsors of Attacks .........................................157
Reconnaissance ...........................................................................157
Open Source Intelligence .......................................................157
Passive Reconnaissance ..........................................................159
Surveillance.................................................................................161
Justifications for Surveillance ................................................161
Advanced Persistent Threat ....................................................162
Voice Surveillance ..................................................................163
Data Surveillance ...................................................................163
Large-Scale Surveillance Programs .......................................164
Uses of Surveillance Data ......................................................165
Summary .....................................................................................165
Endnotes......................................................................................166
Chapter 9 Computer Network Attack.................................................... 167
Waging War in the Cyber Era......................................................168
Physically ...............................................................................168
Electronically..........................................................................168
Logically .................................................................................169
Reactively vs. Proactively ......................................................169
Time as a Factor .....................................................................170
The Attack Process......................................................................170
Recon ......................................................................................171
Scan ........................................................................................172
xii Contents
Access .....................................................................................173
Escalate ...................................................................................174
Exfiltrate .................................................................................174
Assault ....................................................................................175
Sustain ....................................................................................177
Obfuscate ................................................................................177
Summary .....................................................................................178
Endnotes......................................................................................178
Chapter 10 Computer Network Defense ................................................. 179
What We Protect..........................................................................180
Confidentiality, Integrity, Availability ....................................181
Authenticate, Authorize, and Audit ........................................182
Security Awareness and Training................................................183
Awareness ...............................................................................184
Training ..................................................................................185
Defending against Cyber Attacks................................................185
Policy and Compliance ...........................................................186
Surveillance, Data Mining, and Pattern Matching .................187
Intrusion Detection and Prevention ........................................187
Vulnerability Assessment and Penetration Testing ................188
Disaster Recovery Planning ...................................................188
Defense in Depth ....................................................................189
Summary .....................................................................................190
Endnotes......................................................................................191
Chapter 11 Non-State Actors in Computer Network Operations................ 193
Individual Actors.........................................................................194
Script Kiddies .........................................................................195
Malware Authors ....................................................................195
Scammers ...............................................................................196
Blackhats ................................................................................196
Hacktivists ..............................................................................197
Patriot Hackers .......................................................................197
Corporations................................................................................197
Motivation for Corporations to Act in Cyber Warfare ...........198
Cyber Terrorism ..........................................................................198
Reasons for Cyber Terrorist Attacks ......................................199
What Will Happen When We See a Cyber Terrorist Attack? ..199
Organized Cyber Crime ..............................................................201
Motivations for Criminal Organizations .................................201
Contents xiii
Autonomous Actors ....................................................................202
Exploratory Systems ..............................................................202
Attack Systems .......................................................................203
Defensive Systems ..................................................................204
Summary .....................................................................................205
Endnotes......................................................................................206
Chapter 12 Legal System Impacts ......................................................... 207
Legal Systems .............................................................................209
International............................................................................210
United States Laws .................................................................211
Criminal Law ..........................................................................212
Key U.S. Laws.............................................................................213
International Trafficking in Arms Regulations .......................214
U.S. Cyber Related Laws .......................................................214
Privacy Impacts...........................................................................218
Electronic Communications Privacy Act ...............................218
Digital Forensics .........................................................................219
Certification ............................................................................221
Summary .....................................................................................222
Endnotes......................................................................................222
Chapter 13 Ethics ................................................................................ 225
Ethics in Cyber Warfare ..............................................................226
Use of Force ...........................................................................226
Intent .......................................................................................227
Secrecy ...................................................................................227
Attribution ..............................................................................227
Military Ethics ........................................................................227
Bellum Iustum (Just War Theory)...............................................228
Jus ad Bellum (The Right to Wage War) ................................230
Jus in Bello (Proper Conduct in War) ....................................232
Jus Post Bellum (Justice after War) ........................................234
Summary .....................................................................................235
Endnotes......................................................................................236
Chapter 14 Cyberspace Challenges....................................................... 239
Cybersecurity Issues Defined......................................................240
Policy ......................................................................................241
Processes ................................................................................242
Technical ................................................................................243
xiv Contents
Skills .......................................................................................247
People .....................................................................................247
Organization ...........................................................................249
Core (Impacting All Areas) ....................................................249
Interrelationship of Cybersecurity Issues....................................252
Way Ahead ..................................................................................254
Summary .....................................................................................255
Endnotes......................................................................................256
Chapter 15 The Future of Cyber War...................................................... 257
Near Term Trends........................................................................263
Most Likely and Most Dangerous Courses of Action.................266
New Technologies and New Problems........................................268
International Interactions ............................................................270
Summary .....................................................................................271
Endnotes......................................................................................271
Appendix: Cyber Timeline............................................................................ 273
Index .......................................................................................................... 277