O'Reilly logo

The Basics of Cyber Warfare by Jason Andress, Steve Winterfeld

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5

Offensive Tactics and Procedures

Information in this chapter:

• Computer Network Exploitation

• Computer Network Attack

Computer Network Exploitation

The term Computer Network Exploitation (CNE) is a cyber warfare term of military origin, and one that may be slightly confusing to those that are not immediately familiar with the concept. While we might be tempted to think that the “exploit” in CNE refers to exploits used against systems in order to gain privileges or remote shells on them, this is not the case. In actuality, exploit in this case refers to the ability to exploit the data or information gathered on our target for our own purposes. Officially defined, CNE is “Enabling operations and intelligence collection capabilities ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required