Skip to Main Content
Hands-On Cybersecurity with Blockchain
book

Hands-On Cybersecurity with Blockchain

by Rajneesh Gupta
June 2018
Beginner to intermediate content levelBeginner to intermediate
236 pages
6h 39m
English
Packt Publishing
Content preview from Hands-On Cybersecurity with Blockchain

Live attack execution

In recent attacks, adversaries have run arbitrary code that is executed from a Microsoft Word document without the use of any macros or scripts. This technique is a legitimate Microsoft Office functionality called Dynamic Data Exchange (DDE).

Let's try to see this attack from a cyber kill chain perceptive. The Cyber kill chain is used to describe the attack stages:

  • Reconnaissance: This is a planning phase where the attacker gathers information about something through observation or other detection methods. Cyberattack planning and reconnaissance often include conducting research about the target, usually with open source information gathering tools, such as Google and Shodan, as well as through searches of publicly ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Securing Blockchain Networks like Ethereum and Hyperledger Fabric

Securing Blockchain Networks like Ethereum and Hyperledger Fabric

Alessandro Parisi
Role of Blockchain Technology in IoT Applications

Role of Blockchain Technology in IoT Applications

Shiho Kim, Ganesh Chandra Deka, Peng Zhang

Publisher Resources

ISBN: 9781788990189Other