Reverse Deception: Organized Cyber Threat Counter-Exploitation (131 page)

Read Reverse Deception: Organized Cyber Threat Counter-Exploitation Online

Authors: Sean Bodmer

Tags: #General, #security, #Computers

BOOK: Reverse Deception: Organized Cyber Threat Counter-Exploitation
8.31Mb size Format: txt, pdf, ePub
Kaspersky, Eugene
kernel exploits
Kernelmode.info
website
Kilger, Max
KisMAC tool
Kismet tool
knowledge source
Kosovo-hackers Group
Kretschmer, Ernst

L

L0pht group
l33t hackers website
Larkin, Paul
laughing out loud (LOL)
law.
See
legal issues
law enforcement, British
law enforcement (LE) agencies
“law of small numbers”
lawyers.
See also
legal issues
        communicating with
        working with
LE (law enforcement) agencies
legal issues.
See also
lawyers
        conclusion
        ethics in cyberspace
        finding laws/statutes
        hacking back and
        honeypots/honey/nets
        interpreting laws/statutes
        investigations
        legal terms
        online legal resources
        research
        role of laws/statutes
        statutes
legislative history
liaisons
linguistics
link analysis
LinkedIn
Linux-Hacker.net
website
listening skills
Locard, Edmond
Lockheed Martin
logs
        activity
        antivirus
        firewalls
        honeyclients
        honeynets
        IDS/IPS
        investigating
        IRC chat
        monitoring
        network traffic
        router
        server/workstation
LOIC (Low Orbit Ion Cannon)
LOL (laughing out loud)
Lombroso, Cesare
Long Tail principles
LOVELETTER worm
Low Orbit Ion Cannon (LOIC)
LULZ
LulzSec attacks
LulzSec group
lying

M

macro-level analyses
“Mad Bomber” case
magic/religion dimension
“Magruder’s principle”
makecrafters
Malc0de Database
malicious loaders
malicious URLs
malvertising
malware
        e-mail and
        “tall tale”
        against world governments
Malware Analysis System
malware authors
malware backdoor
Malware Domain List
Malware Protection Cloud
Malware URL repository
Manning, Bradley
marauders
Markoff, John
Maskirovka deception
MEECES acronym
Message Exchanger (MX)
metadata
Metasploit tool
Metesky, George
methods/skills
metrics
Meyers, Carol
Michael, Glyndwr
micro-level analyses
Microsoft
Microsoft Malware Protection Center
Microsoft Network Monitor
MILDEC (Military Deception)
Military Deception (MILDEC)
military organizations
Mitnick, Kevin
money
monitoring
Moonlight Maze APT
Morgan Stanley
Morris, Robert
motivation
        analysis of
        cause
        changes to
        ego
        entertainment
        entrance to social groups
        money
        as profiling tool
        status
motivation vector
motives/intent
Mt. Gox
Mudge
“Multiple Forms of Surprise”
murder cases
murderers
MX (Message Exchanger)
MySpace

N

National Counterintelligence Executive (NCIX)
National Security Agency (NSA)
NCIX (National Counterintelligence Executive)
Nessus tool
NetStumbler tool
Network Threat Behavior Analysis
network-based detection tools
networks
        analyzing
        “battle terrain”
        enterprise
        improving security of
        layout
        management issues
        physical access to
        social
        traffic
        value
        wireless
Next Generation Network Protection
Night Dragon event
NIPRNET
Nolo.com
Norman Endpoint Protection tool
Northrup Grumman
NSA (National Security Agency)

O

objectives
objects.
See
evidential objects
observables
        actions
        attack origination points
        described
        knowledge source
        numbers involved in attack
        objectives
        postmortem breakdown
        proactive breakdown
        rankings
        resources

Other books

The Next Best Thing by Deidre Berry
The Star-Touched Queen by Roshani Chokshi
Sabrina Fludde by Pauline Fisk
Empery by Michael P. Kube-McDowell
The Water Road by JD Byrne
Suddenly, a Knock on the Door: Stories by Etgar Keret, Nathan Englander, Miriam Shlesinger, Sondra Silverston