O'Reilly logo

Reverse Deception: Organized Cyber Threat Counter-Exploitation by Jade Jones, Gregory Carpenter, Dr. Max Kilger, Sean Bodmer

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER
6
Threat (Attacker) Tradecraft
image
 
Now we will dive into the tradecraft used by threats (your adversaries). They come in many forms and will use many guises to remain persistent.
In this chapter, we are going to cover not only some of the vectors of attack, but also the state of the threat’s underground economy and some of the more interesting methods and tactics used by threats to distribute their “booty and bling” from your enterprise to make the most bang for their buck. Some of the more persistent criminal groups will even use tactics similar to those of the more advanced SSCTs, simply to maintain access to your resources.
Threat Categories ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required