Index
9/11 attack
100 Acre Wood Boot Camp
2009 FBI Uniform Crime Report
A
abuse.ch data repository
academic research abuse
access control lists (ACLs)
ACLs (access control lists)
acquisition security
actionable intelligence
actions
ACTs (advanced cyber threats)
Adobe
advanced cyber threats (ACTs)
advanced persistent threats. See APTs
adversaries. See attack characterization
adversary environment
advertising campaigns
Ahmadinejad, Mahmoud
Allee, Verna
AmaDa tracker
ambiguity-decreasing deceptions
analysis detection systems
annotated codes
anonymity
“Anonymous” hactivist group
Anti-Malware tool
antivirus. See AV
Anubis data repository
application vulnerability scenario
APTs (advanced persistent threats). See also threats
conclusion
considerations
criteria
defined
defined by Wikipedia
examples of
history of
Internet value chain and
investing in
sizing up
value networks and
value of
vs. persistent threats
ARPANET
Assange, Julian
asset development/handling
asset validation
AT&T wiretaps
attack attribution. See also profiling
civilian cyber warrior
conclusion
example study
levels of information in objects
overview
profiling vectors
references
attack characterization
conclusion
events
forensic adversary characterization
motive/intent
overview
postincident characterization
real-world tactics
starting point for
theoretical
threats
attackers. See also hackers; victims
antisocial behavior
blocking vs. monitoring
characterizing. See attack characterization
commuters
educational level
marauders
motivation. See motivation
organized vs. disorganized
personality traits/behaviors
profiling. See profiling
skill level
social networks. See social networks
social psychology
state-sponsored
symbols
time considerations
understanding
attacks. See also engagements; threats
attribution. See attack attribution
balance of power and
blocking vs. monitoring
characterization. See attack characterization
cost vs. profit
into criminal infrastructures
detection of. See detection
e-mail-based
hacking back
infiltration response planning
isolating
measuring resources
metrics applied to
numbers involved in
opportunistic
opportunistic turned targeted
origination points
overkill
planned vs. premeditated
postmortems
risk tolerance
skill level
skills/methods
targeted
timeliness aspect of
when to act/not act
Attorney General Guidelines
autopsy, psychological
Autopsy Browser
AV (antivirus)
described
fake antivirus (FAV)
rogue AV-based products
AV logs
AV tools
AV Tracker
B
balance of power
Barboz, David
Basic Input/Output Systems (BIOS)
Behavioral Analysis Units
behavioral profiling
Bencivenga, Angelo
bias
bill number
bills
BIOS (Basic Input/Output Systems)
Bitcoin currency
blackhat community
Blackhole exploit kits
blacklists
blocking
bluffing
Bodmer, Sean
Bongardt, Steve
booting computer
botnet masters
botnet operators (goonies)
botnets
Citadel
Ice-X
overview
SpyEye
Stormworm
subleasing
Zeus
BPH (bulletproof hosting)
Brenner, Joel (Dr.)
British law enforcement
Brussel, James
bulletproof hosting (BPH)
Byzantine Hades APT
C
Cain & Able tool
Canadian Dow Chemical
Candor APT
Canter, David
carding communities
career criminals
Carrier Service Provider (CSP) tools
cause, as motivation
CCI (cyber counterintelligence)
CCTV (closed circuit television)
CDs, automount
censorship
center of gravity (COG)
centralized planning/control
channel capacity
chapter
chaptered
characterization. See attack characterization
Chief Information Officer (CIO)
Chief Security Officer (CSO)
Chiesa, Raoul
China
Chinese counterintelligence
Chinese government
Chinese hacking groups
Chinese Information Warfare doctrine
Chinese state-sponsored hackers
Chinese-backed attacks
“Choice of Types” deception
CI (counterintelligence)
CIA (criminal investigative analysis). See also profiling
CIO (Chief Information Officer)
circle theory
circles of trust
Cisco Systems, Inc.
Citadel bot
citations
civilian cyber warrior
ClamAV tool
classification/dissemination rules
Clean MX data repository
client-side exploits
closed circuit television (CCTV)
clues
CnC (Command and Control)
CnC back-end server
COA (Course of Action)
codes. See also statutes
COG (center of gravity)
cognitive psychology
collected intelligence
collection planning
collection/analysis
Command and Control. See CnC
communication skills
communications, socially meaningful
commuters
computer crime. See cyber crimes
computer security. See also security
boot issues
importance of
physical security
vetting
computers
automounting
bootup of
physical access to
Conficker virus
consistency
Contagio Malware Dump
context staging
copyrights
Core Impact tool
counterintelligence. See also cyber counterintelligence
anonymity and
applying to cyber realm
asset validation
Chinese
classification/dissemination rules
collection/analysis
conclusion
considerations
countermeasures
double agent operations
fundamental competencies
interviewing/debriefing techniques
joint/interagency operations
key points
observables
relationships
reporting procedures/methods
research/technology protection
risk assessment
Russian
sizing up APTs
survelliance/countersurveillance
terminology
United States
“whack and tag a mole”
counterintelligence (CI)
countermeasures
countersurveillance
coup stick
Course of Action (COA)
cowpens
crimes. See cyber crimes
crimeware/analysis detection systems
criminal investigative analysis (CIA). See also profiling criminals
career
hacking into infrastructure
profiling. See profiling
Russian Business Network
skill level
teams of
tools/techniques
violent
CSO (Chief Security Officer)
CSP (Carrier Service Provider) tools
CTA (cyber threat acquisition)
Cyber Adversary Characterization
cyber counterintelligence (CCI). See also counterintelligence
cyber crimes
four epochs in
geographic details
motivation for. See motivation
reported
skill level
social networks. See social networks
time of
cyber currency
cyber espionage
cyber profiling
cyber threat acquisition (CTA)
cyber warfare
cyber warrior
cyberspace
considerations
ethics in
role of
D
D5 (Disrupt, Deny, Degrade, Deceive, and Destroy)
Damballa CSP (Carrier Service Provider) tools
Damballa Failsafe tool
Dasient website
data
analysis
capture
control
interpreting
public security sources
repositories
The Day Before Zero blog
D-Day invasion
DDoS (Distributed Denial of Service)
debriefing techniques
deceit. See deception
deception
ambiguity-decreasing deceptions
bias and
centralized planning/control
“Choice of Types” deception
conclusion
considerations
cowpens
demonstrations
described
displays
feedback and
feints
First US Army Group deception
focus
government use of
“half-empty” perspective
“half-full” perspective
human information processing limits
“Husbanding of Deception Assets,”
integration
“Jones Dilemma,”
key points
“Magruder’s principle”
Maskirovka deception
“Multiple Forms of Surprise”
necessity of
objectives
operational. See operational deception
operations security
perceptual consistency
placement of deceptive material
psychology of
reasons for
resources used for
ruses
sensory components
“Sequencing Rule”
simplicity vs. elaborate stories
six principles of
“step-beyond” version
timeliness
“totally full” perspective
traditional
“two-steps-beyond” version
unwanted reactions
vetting
virtual
deception maxims
deception technologies
deception theme
deductive profiling
defense-in-depth approach
defense-in-depth honeynets
demilitarized zone (DMZ)
demonstrations
Denial of Service (DoS)
Department of Defense (DoD)
Department of Homeland Security (DHS)
derogatory dimension
derogatory terms
Desert Storm
detection
crimeware/analysis detection systems
host-based tools
network-based tools
detection technologies
DHCP (Dynamic Host Control Protocol)
DHS (Department of Homeland Security)
dialectical approach
differentiation
digital devices
digital forensics tools
“digital individual”
disinformation
disorganized offenders
displays
Disrupt, Deny, Degrade, Deceive, and Destroy (D5)
dissemination rules
Distributed Denial of Service (DDoS)
distribution provider (infector)
DLL (Dynamic Link Library)
Dmoz.org website
DMZ (demilitarized zone)
DNS (Domain Name Service)
DNS Blacklist
DNS-BH Malware Domain Blocklist
DoD (Department of Defense)
Domain Name Service. See DNS
domain names
“Domino’s theory”
Dorchester Heights
DoS (Denial of Service)
double agent operations
Douglas, John
Dow Chemical
downloads, drive-by
drive-by downloads
dumpster-diving
Dynamic Host Control Protocol (DHCP)
Dynamic Link Library (DLL)
E
education, level of
ego
Eisenhower, Dwight (General)
EKs (exploit kits)
e-mail
as malware backdoor
socially engineered
e-mail-based attacks
employees
dissatisfied
importance of
vetting
EnCase tool
Endpoint Protection tool
EndPointSecurity tool
engagements. See also attacks
tactics
vetting
engrossed
enrolled
enterprise networks
entertainment
espionage
The Ethical Hacker Network
ethics in cyberspace
events
evidence
evidential objects
Executive Order (EO) 12333
Exploit Database
exploit kits (EKs)
F
Facebook
Failsafe tool
fake antivirus (FAV)
FAV (fake antivirus)
FBI Academy
FBI Uniform Crime Report
Fear, Uncertainty, and Doubt/Doom (FUD)
Federal Emergency Management Agency (FEMA)
feedback, imporance of
feints
FEMA (Federal Emergency Management Agency)
File Transfer Protocol (FTP)
files
attachments
censored
honeynet setup for
log. See logs
monitoring
financial gain
financial institutions
financial stream
firewalls
First US Army Group (FUSAG)
FISA (Foreign Intelligence Surveillance Act)
FOCA
focus
Foothold APT
foreign intelligence service
Foreign Intelligence Surveillance Act (FISA)
forensic adversary characterization
Forensic Toolkit (FTK)
forensics
forensics tools
FORSCOM (US Army Forces Command)
forums
FTK (Forensic Toolkit)
FTP (File Transfer Protocol)
FUD (Fear, Uncertainty, and Doubt/Doom)
FUSAG (First US Army Group)
G
Gangsta Bucks group
Gates, Bill
GEN (generation)
generation (GEN)
geolocation vector
GFI EndPointSecurity tool
Ghost Busters
GhostNet APT
glossary
Google incidents
Chinese hackers
Gmail exploit
Google Scholar
goonies
Gribodemon
H
Hack Forums
hacked websites
hackers. See also attackers
antisocial behavior
carding communities
changing social structure of
Chinese hacking groups
demonization of
derogatory dimension
hacking for money
Hacktivist groups
magic/religion dimension
as meritocracy
motivation. See motivation
“patriotic hackers”
Russian hacking gangs
social networks. See social networks
social psychology
state-sponsored hackers
status position
taxonomies
technology dimension
hacking back
Hacktivist groups
Hanssen, Robert
Harper, Allen
Hazelwood, Roy
HBGary
Helms, Richard
HIDS (Host Intrusion Detection System)
High Orbit Ion Cannon (HOIC)
high-volume websites
HIPS (Host Intrusion Prevention System)
Hitler, Adolf
HMIs (human machine interfaces)
HOIC (High Orbit Ion Cannon)
Hollinger, Richard
Holt, Tom
homicides. See also murderers
honesty
honeyclients
honeygrids
Honeynet Project
honeynets
architecture
content filling
“defense-in-depth”
described
detection of
disabling of
Gen III
layers
legal issues
logs
objectives
production-based
purpose of
research-based
risks/issues
training for
violations
honeypots
considerations
content staging
described
evidence obtained via
example scenarios
layers
patch levels
tuned
honeywalls
accreditation
data analysis
data capture
data collection
data control
overview
horizontal phishing
host configuration
host content
Host Intrusion Detection System (HIDS)
Host Intrusion Prevention System (HIPS)
host profiles
host-based detection tools
host/server vulnerability tools
HTTP (Hypertext Transfer Protocol)
human information processing limits
Human Intelligence (HUMINT)
human machine interfaces (HMIs)
HUMINT (Human Intelligence)
humor
“Husbanding of Deception Assets”
Hussein, Sadam
Hüssy, Roman
Hypertext Transfer Protocol (HTTP)
I
IAD (Information Assurance Directorate)
IC3 (Internet Crime Complaint Center)
Ice-X bots
ID (identification)
IDA Pro tool
identification (ID)
IDSs (intrusion detection systems)
Immunet Pro tool
indications
inductive profiling
industrial espionage. See espionage
infection vectors
infector
Information Assurance Directorate (IAD)
Information Operations
information security, vetting
Information Technology (IT)
information vectors
Information Warfare
Information Warfare Manual (IWM)
Information Warfare Monitor (IWM)
infrastructure costs
“in-game currency”
injection vectors
integration
intellectual property
Internet Crime Complaint Center (IC3)
Internet Protocol (IP)
Internet Relay Chat (IRC)
Internet Service Providers (ISPs)
Internet value chain
Internet Worm
Internetworking Operating System (IOS)
interviewing techniques
intrusion detection systems (IDSs)
intrusion prevention systems (IPSs)
intrusions. See also attacks
postmortems
risk tolerance
timeliness aspect of
investigations
investigative techniques/tools
IOS (Internetworking Operating System)
IP (Internet Protocol)
IP addresses
IPSs (intrusion prevention systems)
Iraq invasion
IRC (Internet Relay Chat)
IRC chat logs
ISPs (Internet Service Providers)
IT (Information Technology)
IWM (Information Warfare Manual)
IWM (Information Warfare Monitor)
J
James, Lance
Jargon File
John the Ripper tool
Johnson, Samuel
joint/interagency operations
“Jones Dilemma”
Juniper Networks
K
Kaspersky, Eugene
kernel exploits
Kilger, Max
KisMAC tool
Kismet tool
knowledge source
Kosovo-hackers Group
Kretschmer, Ernst
L
L0pht group
l33t hackers website
Larkin, Paul
laughing out loud (LOL)
law. See legal issues
law enforcement, British
law enforcement (LE) agencies
“law of small numbers”
lawyers. See also legal issues
communicating with
working with
LE (law enforcement) agencies
legal issues. See also lawyers
conclusion
ethics in cyberspace
finding laws/statutes
hacking back and
honeypots/honey/nets
interpreting laws/statutes
investigations
legal terms
online legal resources
research
role of laws/statutes
statutes
legislative history
liaisons
linguistics
link analysis
LinkedIn
listening skills
Locard, Edmond
Lockheed Martin
logs
activity
antivirus
firewalls
honeyclients
honeynets
IDS/IPS
investigating
IRC chat
monitoring
network traffic
router
server/workstation
LOIC (Low Orbit Ion Cannon)
LOL (laughing out loud)
Lombroso, Cesare
Long Tail principles
LOVELETTER worm
Low Orbit Ion Cannon (LOIC)
LULZ
LulzSec attacks
LulzSec group
lying
M
macro-level analyses
“Mad Bomber” case
magic/religion dimension
“Magruder’s principle”
makecrafters
Malc0de Database
malicious loaders
malicious URLs
malvertising
malware
e-mail and
“tall tale”
against world governments
Malware Analysis System
malware authors
malware backdoor
Malware Domain List
Malware Protection Cloud
Malware URL repository
Manning, Bradley
marauders
Markoff, John
Maskirovka deception
MEECES acronym
Message Exchanger (MX)
metadata
Metasploit tool
Metesky, George
methods/skills
metrics
Meyers, Carol
Michael, Glyndwr
micro-level analyses
Microsoft
Microsoft Malware Protection Center
Microsoft Network Monitor
MILDEC (Military Deception)
Military Deception (MILDEC)
military organizations
Mitnick, Kevin
money
monitoring
Moonlight Maze APT
Morgan Stanley
Morris, Robert
motivation
analysis of
cause
changes to
ego
entertainment
entrance to social groups
money
as profiling tool
status
motivation vector
motives/intent
Mt. Gox
Mudge
“Multiple Forms of Surprise”
murder cases
murderers
MX (Message Exchanger)
MySpace
N
National Counterintelligence Executive (NCIX)
National Security Agency (NSA)
NCIX (National Counterintelligence Executive)
Nessus tool
NetStumbler tool
Network Threat Behavior Analysis
network-based detection tools
networks
analyzing
“battle terrain”
enterprise
improving security of
layout
management issues
physical access to
social
traffic
value
wireless
Next Generation Network Protection
Night Dragon event
NIPRNET
Norman Endpoint Protection tool
Northrup Grumman
NSA (National Security Agency)
O
objectives
objects. See evidential objects
observables
actions
attack origination points
described
knowledge source
numbers involved in attack
objectives
postmortem breakdown
proactive breakdown
rankings
resources
skills/methods
timeliness
victimology
OC online binary cryptor
offender profiling. See profiling
Ollman, Gunter
OllyDbg tool
online binary cryptor
OODA loop process
open source intelligence (OSINT)
OpenSC.WS online binary cryptor
opensc.ws website
operating system. See OS
Operation Aurora APT
Operation Desert Storm
Operation Mincemeat
Operation Payback attack
Operation Quicksilver
operational deception
conclusion
key points
overview
“tall tales”
operational security
operations
double agent
end game
evaluating success
Military Deception
psychological (PSYOPS)
validating
vetting
operations security (OPSEC)
operators, botnet
opportunistic attacks
opportunistic subleasing
opportunistic usage
OPSEC (operations security)
organized offenders
origination points
OS (operating system)
OS discovery tool
OSINT (open source intelligence)
overkill
P
P2P (peer-to-peer)
P2V (Physical-to-Virtual)
packet capture (PCAP)
Palevo Tracker
Parker, Donn
passive OS fingerprinting (POF)
passwords
BIOS
considerations
tools for hacking
“patriotic hackers”
Patton, George S. (General)
PBX (Private Branch Exchange)
PCAP (packet capture)
peer-to-peer (P2P)
People’s Liberation Army (PLA)
People’s Republic of China (PRC)
perceptual consistency
persistent threats (PTs). See also threats
described
vs. advanced persistent threats
personally identifiable information (PII)
personas
personnel. See employees
persuasion, art of
Petherick, Wayne
phishing
PhishTank data repository
physical security
Physical-to-Virtual (P2V)
PID (process identifier)
PII (personally identifiable information)
PLA (People’s Liberation Army)
planning/control
PLCs (programmable logic controllers)
Plunkett, Deborah
POF (passive OS fingerprinting)
Point of Presence (POP)
“poker face”
POP (Point of Presence)
pornography
Port Scan Attack Detector
postincident characterization
postmortem breakdown
postmortems, threats
Powell, Colin
PRC (People’s Republic of China)
president, U.S.
Private Branch Exchange (PBX)
proactive breakdown
process identifier (PID)
production-based honeynets
profiling. See also attack attribution
basic types of
conclusion
consistency
crime scene environment
criminal
cyber profiling
differentiation
errors in
filtering and
inductive vs. deductive
“Mad Bomber” case
motivation. See motivation
nature of
objectives of
overview
prospective
psychological profiles
references/resources
retrospective
salience
skill level
social networks. See social networks
social psychology
“special population”
statistical models
strategic application
time considerations
traditional
weapons/tactics
winnowing process
profiling vectors. See also vectors
application of profiling techniques
attack attribution
example study
geolocation vector
information vector
micro-/macro-level analyses
motivation
skill level
social networks
tactics vector
time
vector summary
weapon vector
programmable logic controllers (PLCs)
prospective profiling
psychological autopsy
psychological operations (PSYOPS)
psychological profiles
psychology, social
PSYOPS (psychological operations)
PTs. See persistent threats
public data sources
public security data sources/forums
public social networking sites
Q
QQ.com website
R
Rackspace
“Railway Murderer”
Rainbow tables
ransomware
Raptor APT
RAT (Remote Access Trojan)
RAT (Remote Administration Tool)
RBN (Russian Business Network)
references. See resources
relationships
religion/magic dimension
Remote Access Trojan (RAT)
Remote Administration Tool (RAT)
remote synchronization (RSYNC)
reporting procedures/methods
research
academic research abuse
legal
profiling
research-based honeynets
researchers
research/technology protection
resilience provider
resources
attack attribution
described
legal
measuring for attackers
profiling
used for deception
Ressler, Robert
resurrectors
Retina tool
retrospective profiling
return on investment (ROI)
risk assessment
risk tolerance
Robtex website
Rogers, Marcus
rogue AV-based products
ROI (return on investment)
Rootkit.com website
Rossmo, Kim
routers
RSA breach
RSA Corp.
RSYNC (remote synchronization)
ruses
Russia
Russian Business Network (RBN)
Russian counterintelligence
Russian hacking gangs
Russian Maskirovka deception
S
salience
SALUTE (Size, Activity, Location, Unit, Time Equipment)
SandBox Analyzer Pro
sandboxes
Savid Corporation
SCADA (supervisory control and data acquisition) systems
Schwarzkoph, Norman (General)
Second Life
Secure Shell (SSH)
Secure Sockets Layer (SSL)
Securelist website
SecurID technology
security. See also computer security
acquisition
host/server
importance of
improving for networks
OPSEC
passwords. See passwords
physical
public data sources/forums
security management tools
security researchers
semiotics
sensory components
“Sequencing Rule”
server/host vulnerability tools
servers
CnC back-end
Shadowserver
vulnerability tools
Service Set Identification (SSID)
Service-Level Agreement (SLA)
session laws
Shadowserver data repository
Shannon, Claude
Shaw, Eric
shortened URLs
Sinowal Trojan
SIPRNET
Size, Activity, Location, Unit, Time Equipment (SALUTE)
skill level
skills/methods
SLA (Service-Level Agreement)
The Sleuth Kit
Smith, Joe
social communications/connections
social engineering
considerations
described
e-mail
example of
success of
social networks
attacking via
described
example of
as profiling tool
terms-of-service agreements
utilizing
social psychology
software suites
spear phishing
Spectrum tool
SpyEye botnet
SpyEye Tracker
spying. See espionage SQL injection
SSCT (state-sponsored cyber threat)
SSH (Secure Shell)
SSID (Service Set Identification)
SSL (Secure Sockets Layer)
SSR (System Security Readiness)
Stakkato APT
state-sponsored cyber threat (SSCT)
statistical models
status
statutes. See also legal issues
statutory schemes
Stormworm APT
Stormworm botnet
Strings tool
Stuxnet APT
subleasing
supervisory control and data acquisition
(SCADA) systems
surveillance
Symantec
Symantec Endpoint Protection tool
symbols
System Security Readiness (SSR)
T
tactics. See also tools considerations
tactics vector
tailored valid services
Tall Tale (malware)
Tall Tale 1
Tall Tale 2
Tall Tale 3
Tall Tale 4
targeted attacks
cost of
opportunistic turned targeted
overview
scenario
types of organizations
targeted subleasing
taxonomies
TDL Gang
Team Cymru website
teams, criminal
TeamViewer
techcrafters
technology dimension
temporal vector
terminology
terrorists
9/11
attack
domestic
group culture
Total Information Awareness
Teten, Howard
THC-Hydra tool
Threat Management System
ThreatExpert website
threats. See also attacks; tradecraft
academic research abuse
actionable intelligence
advanced persistent threats. See APTs
analyzing
application vulnerability scenario
botnets. See botnets
categories
circles of trust
conclusion
countering
criminal teams
criminal tools/techniques
cyber threat acquisition
determining severity of
distinguishing between
distinguishing objectives
“end game”
engagement tactics
evaluating success in mitigating
evolution of vectors
hacking back
infiltration response planning
knowledge source
persistent
postmortems
questions to ask
skills/methods
tailored valid services
targeted attack scenario
“whack and tag a mole”
thumb drives
TIA (Total Information Awareness)
time vector
time zones
timeliness
Tital Rain APT
titles
TLD (Top-Level Domain)
tools. See also tactics
academic research abuse
analysis detection
antivirus
circles of trust
conclusion
considerations
deception technologies
detection technologies
digital forensics
firewalls
honeypots. See honeypots
host-based detection
injection vectors
intrusion detection systems
intrusion prevention systems
investigative
network-based detection
overview
password hacking
security management
server/host vulnerability
tailored valid services
traffic capture
used by criminals
Tools, Tactics, and Procedures (TTP)
Top-Level Domain (TLD)
Total Information Awareness (TIA)
Total Protection for Endpoint
tradecraft. See also threats
trademarks
traffic analysis
traffic capture tools
Tribe.net website
Trojan Hydraq
Trojans
hidden
malicious loaders
Remote Access Trojan
Sinowal Trojan
Trojan Hydraq
Zeus Trojan
truth
TTP (Tools, Tactics, and Procedures)
tuned honeypots
Turvey, Brent
Twitter
Tzu, Sun
U
UGC (user-generated content)
underground forums
United States
universal resource identifiers (URIs)
universal resource locators (URLs)
Universal Time Clock (UTC)
Unix wizards
URIs (universal resource identifiers)
URLs (universal resource locators)
US Army Forces Command (FORSCOM)
US Computer Emergency Readiness Team (US-CERT)
US Cyber Command (USCYBERCOM)
USB thumb drives
US-CERT (US Computer Emergency Readiness Team)
USCYBERCOM (US Cyber Command)
user-generated content (UGC)
usernames
UTC (Universal Time Clock)
V
validating operations
Value Network Analysis (VNA)
value networks
vectors
evolution of
geolocation
infection
information
injection
levels of information in
profiling. See profiling vectors
social communications/connections
summary
tactics
temporal
weapons
vertical phishing
vetting
deceptions
engagements
importance of
perpetual consistency
ViCheck.ca website
victimology
victims
analyzing
psychological autopsy
relationship to offender
timeline
weapons used on
violent criminals
virtual deception
virtual economies
Virtual Machine Manager (VMM)
virtual machines (VMs)
Virtual Private Network (VPN)
virtual property
VirusTotal website
VMM (Virtual Machine Manager)
VMs (virtual machines)
VNA (Value Network Analysis)
von Clausewitz, Carl
VPN (Virtual Private Network)
vulnerabilities
analyzing
applications
CnC back end
considerations
defined
host/server
multiple
proprietary software
Windows operating system
W
WarmTouch system
warnings
weapon vector
weapons
WebMonitor tool
Webopedia
websites
analyzing
cause-motivated attacks
crawling
defacements
exploit kits
fake
government
hacked
high-volume
legal
malicious
military
of potential offenders
social networking. See social networks
underground forums
Wepawet website
whaling
whitelists
WikiLeaks
Wikipedia
Wildersecurity website
Windows operating system
wireless devices
wireless networks
Wireshark tool
wizards
writing skills
Y
YGN Ethical Hacker Group
Z
Zeus bot
ZeuS Tracker
Zeus Trojan
Zhou Dynasty
Zloy forums
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset