Skip to Content
Adversarial Tradecraft in Cybersecurity
book

Adversarial Tradecraft in Cybersecurity

by Dan Borges
June 2021
Intermediate to advanced content levelIntermediate to advanced
246 pages
7h 40m
English
Packt Publishing
Content preview from Adversarial Tradecraft in Cybersecurity

5

Active Manipulation

When you encounter your opponent before they are aware of your presence, you can gain a unique opportunity to tamper with their perception. By tampering with the opponent before they notice your presence, you can further hinder their ability to detect your existence. This can be risky as it involves active deception, but it can pay great dividends when pulled off successfully. While the attacker's methodology can embrace this deception, with techniques such as log deletion and the use of rootkits, the defenders can also invoke active manipulation to slow down attackers in their environment. They can remove the offense's ability to operate effectively, frustrate malicious actors in their environment, and ultimately increase ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Hands-On Security in DevOps

Hands-On Security in DevOps

Tony Hsiang-Chih Hsu

Publisher Resources

ISBN: 9781801076203Supplemental Content