Read Reverse Deception: Organized Cyber Threat Counter-Exploitation Online
Authors: Sean Bodmer
Tags: #General, #security, #Computers
titles
TLD (Top-Level Domain)
tools.
See also
tactics
academic research abuse
analysis detection
antivirus
circles of trust
conclusion
considerations
deception technologies
detection technologies
digital forensics
firewalls
honeypots.
See
honeypots
host-based detection
injection vectors
intrusion detection systems
intrusion prevention systems
investigative
network-based detection
overview
password hacking
security management
server/host vulnerability
tailored valid services
traffic capture
used by criminals
Tools, Tactics, and Procedures (TTP)
Top-Level Domain (TLD)
Total Information Awareness (TIA)
Total Protection for Endpoint
tradecraft.
See also
threats
trademarks
traffic analysis
traffic capture tools
Tribe.net
website
Trojan Hydraq
Trojans
hidden
malicious loaders
Remote Access Trojan
Sinowal Trojan
Trojan Hydraq
Zeus Trojan
truth
TTP (Tools, Tactics, and Procedures)
tuned honeypots
Turvey, Brent
Tzu, Sun
U
UGC (user-generated content)
underground forums
United States
universal resource identifiers (URIs)
universal resource locators (URLs)
Universal Time Clock (UTC)
Unix wizards
URIs (universal resource identifiers)
URLs (universal resource locators)
US Army Forces Command (FORSCOM)
US Computer Emergency Readiness Team (US-CERT)
US Cyber Command (USCYBERCOM)
USB thumb drives
US-CERT (US Computer Emergency Readiness Team)
USCYBERCOM (US Cyber Command)
user-generated content (UGC)
usernames
UTC (Universal Time Clock)
V
validating operations
Value Network Analysis (VNA)
value networks
vectors
evolution of
geolocation
infection
information
injection
levels of information in
profiling.
See
profiling vectors
social communications/connections
summary
tactics
temporal
weapons
vertical phishing
vetting
deceptions
engagements
importance of
perpetual consistency
ViCheck.ca
website
victimology
victims
analyzing
psychological autopsy
relationship to offender
timeline
weapons used on
violent criminals
virtual deception
virtual economies
Virtual Machine Manager (VMM)
virtual machines (VMs)
Virtual Private Network (VPN)
virtual property
VirusTotal website
VMM (Virtual Machine Manager)
VMs (virtual machines)
VNA (Value Network Analysis)
von Clausewitz, Carl
VPN (Virtual Private Network)
vulnerabilities
analyzing
applications
CnC back end
considerations
defined
host/server
multiple
proprietary software
Windows operating system
W
WarmTouch system
warnings
weapon vector
weapons
WebMonitor tool
Webopedia
websites
analyzing
cause-motivated attacks
crawling
defacements
exploit kits
fake
government
hacked
high-volume
legal
malicious
military
of potential offenders
social networking.
See
social networks
underground forums
Wepawet website
whaling
whitelists
WikiLeaks
Wikipedia
Wildersecurity website
Windows operating system
wireless devices
wireless networks
Wireshark tool
wizards
writing skills
Y
YGN Ethical Hacker Group
Z