Text
Targeted cyber attacks : multi-staged attacks driven by exploits and malware
Table of Contents
A Few Words About Targeted Cyber Attacks
Acknowledgments
About the Authors
Overview
Chapter 1. Introduction
References
Chapter 2. Intelligence Gathering
2.1 Intelligence Gathering Process
2.2 OSINT, CYBINT, and HUMINT
2.3 OSNs: A Case Study
References
Chapter 3. Infecting the Target
3.1 Elements Used in Incursion
3.2 Model A: Spear Phishing Attack: Malicious Attachments
3.3 Model B: Spear Phishing Attack: Embedded Malicious Links
3.4 Model C: Waterholing Attack
3.5 Model D: BYOD as Infection Carriers: USB
3.6 Model E: Direct Incursion: Network Exploitation
References
Chapter 4. System Exploitation
4.1 Modeling Exploits in Targeted Attacks
4.2 Elements Supporting System Exploitation
4.3 Defense Mechanisms and Existing Mitigations
4.4 Anatomy of Exploitation Techniques
4.5 Browser Exploitation Paradigm
4.6 Drive-By Download Attack Model
4.7 Stealth Malware Design and Tactics
References
Chapter 5. Data Exfiltration Mechanisms
5.1 Phase 1: Data Gathering Mechanisms
5.2 Phase 2: Data Transmission
References
Chapter 6. Maintaining Control and Lateral Movement
6.1 Maintaining Control
6.2 Lateral Movement and Network Reconnaissance
References
Chapter 7. Why Targeted Cyber Attacks Are Easy to Conduct?
7.1 Step 1: Building Targeted Attack Infrastructure
7.2 Step 2: Exploring or Purchasing Stolen Information About Targets
7.3 Step 3: Exploits Selection
7.4 Step 4: Malware Selection
7.5 Step 5: Initiating the Attack
7.6 Role of Freely Available Tools
References
Chapter 8. Challenges and Countermeasures
8.1 Real-Time Challenges
8.2 Countermeasures and Future Developments
References
Chapter 9. Conclusion
References
Abbreviations
No other version available