Skip to Main Content
Cyber Warfare, 2nd Edition
book

Cyber Warfare, 2nd Edition

by Jason Andress, Steve Winterfeld
October 2013
Intermediate to advanced content levelIntermediate to advanced
324 pages
12h 10m
English
Syngress
Content preview from Cyber Warfare, 2nd Edition
Chapter 6

Logical Weapons

Abstract

A variety of tools are available for use in cyber warfare, penetration testing, and security in general. And most of them are free (or have free versions) and are available to the general public. For instance, reconnaissance tools can gather general information, search whois and DNS records, and search metadata from media and documents. Scanning tools, such as Nmap and Nessus, can find systems and detect areas where vulnerabilities might exist. Access and privilege escalation tools, such as Metasploit and CANVAS, can penetrate system accounts. Exfiltration tools can encrypt, hide, or smuggle data over common protocols to remove them from a compromised system. Backdoors can sustain a connection to a compromised ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Inside Cyber Warfare, 2nd Edition

Inside Cyber Warfare, 2nd Edition

Jeffrey Carr
Cyber Warfare

Cyber Warfare

Jason Andress, Steve Winterfeld
The Basics of Cyber Warfare

The Basics of Cyber Warfare

Jason Andress, Steve Winterfeld

Publisher Resources

ISBN: 9780124166721