= C Y B E R W A R F A R E =
Techniques, Tactics and Toolsfor Security Practitioners
Jason AndressSteve Winterfeld
Russ Rogers Technical Editor
Foreword by Stephen Northcutt
![]() |
Cyber Warfare |
About the Authors
Jason Andress (ISSAP, CISSP, GPEN, CEH) is a seasoned security professional
with a depth of experience in both the academic and business worlds. He is presently
employed by a major software company, providing global information security oversight,
and performing penetration testing, risk assessment, and compliance functions
to ensure that the company’s assets are protected.
Jason has taught undergraduate and graduate security courses since 2005 and
holds a Doctorate in Computer Science, researching in the area of data protection.
He has authored several publications and books, writing on topics including data
security, network security, penetration testing, and digital forensics.
Steve Winterfeld (CISSP, PMP, SANS GSEC, Six Sigma, and holds TS/SCI clearance)
has a strong technical and leadership background in Cybersecurity, Military
Intelligence, Certification & Accreditation (C&A), Simulations and Project Management.
Currently, he is the TASC Technical Lead for Cybersecurity and manager
of their TERANet research labs. He also directs their Vulnerability Assessment and Penetration
Test Team and is the primary instructor for their CyberWarrior™
Course on hacker mentality and methodology.
Previously, Steve built the Computer Emergency Response Center in support
of U.S. Army South, responsible for monitoring security real-time and conducting
forensic investigations on intrusions. He also led the team that produced the first
Global Hawk Unmanned Aerial System (UAS) C&A package. Steve was an Airborne
Ranger, EW Company Cdr, Armor Bn S2, Signal BN XO and finished his career as
Command and General Staff Instructor in the USAR. He has a MS in Computer
Information Systems and currently lives in Colorado with his family.
Acknowledgments
Jason Andress and Steve Winterfeld
We thank our families and friends for their guidance, support, and fortitude throughout this project.
We dedicate this book to those in the security industry who are making the world a better place through efforts like Hackers for Charity
(You may have seen their T-shirts—“i hack charities.” For more information, go to http://hackersforcharity.org). To those who are not we say—get engaged!
Russ Rogers
Russ would like to thank his children, his father, and Tracie for being so supportive over the years. Thanks and shout outs go out to Chris Hurley, Mark Carey, Rob Bathurst, Pushpin, Paul Criscuolo, Ping Look, Greg Miles, Ryan Clarke, Luke McOmie, Curtis Letson, and Eddie Mize.
Syngress is an imprint of Elsevier
225 Wyman Street, Waltham, MA 02451, USA
Table of Contents
Acknowledgments
About the Authors
About the Technical Editor
Foreword
Introduction
Chapter 1 What is Cyber Warfare?
What is Cyber Warfare?
Definition for Cyber Warfare Tactical and Operational Reasons for Cyber War
Cyber Strategy and Power
Cyber Arms Control
What is the United States Doing About the Threat of a
Cyber War?
Have We Seen a Cyber War?
Case Studies
The Debate (Is it Real?)
Why Cyber Warfare is Important
Summary
Endnotes
Chapter 2 The Cyberspace Battlefield
Boundaries in Cyber Warfare
Defense in Depth
Physical Infrastructure
Organizational View
Where Cyber Fits in the War-fighting Domains
Land
Sea
Air
Space
Cyber Domain
Threatscape
Most Active Threats
Most Dangerous Threats
Motivations
Fielding Systems at the Speed of Need
Summary
Endnotes
Chapter 3 Cyber Doctrine
Current U.S. Doctrine
U.S. Forces
U.S. Air Force
U.S. Navy
U.S. Army
DoD INFOCONs
Sample Doctrine/Strategy from Around the World
Chinese Doctrine
Other Key Nations Developing Doctrine
Translating Traditional Military Doctrine
IPOE
JMEM
MOE
BDA
CAS
COIN
Guidance and Directives
CNCI
DHS
HSPD
NIST
Academia and Industry Associations
Operations and Exercises
Federal Exercises
DoD Exercises
Educational Exercises
Sample MESLs
Summary
Endnotes
Chapter 4 Cyber Warriors
What Does a Cyber Warrior Look Like?
Certifications
Education and Training
Experience and Skills
Differences from Traditional Forces
Age
Attitude
Physical Condition
Credentials
Present Cyber Warfare Forces
U.S.
China
Russia
France
Israel
Brazil
Singapore
South Korea
North Korea
Australia
Malaysia
Japan
Canada
United Kingdom
Other Countries with Cyber Forces
Corporate
Criminal
Staffing for Cyber War
Sources of Talent
Training the Next Generation
Summary
Endnotes
Chapter 5 Logical Weapons
Reconnaissance Tools
General Information Gathering
Whois
DNS
Metadata
Maltego
Defense
Scanning Tools
Access and Escalation Tools
Password Tools
The Metasploit Project
Immunity CANVAS
Defense
Exfiltration Tools
Physical Exfiltration
Encryption and Steganography
Using Common Protocols
Out of Band Methods
Defense
Sustainment Tools
Adding “Authorized” Access
Backdoors
Defense
Assault Tools
Meddling with Software
Attacking Hardware
Defense
Obfuscation Tools
Location Obscuration
Log Manipulation
File Manipulation
Defense
Summary
Endnotes
Chapter 6 P hysical Weapons
How the Logical and Physical Realms are Connected
Logical Systems Run on Physical Hardware
Logical Attacks Can Have Physical Effects
Infrastructure Concerns
What is SCADA?
What Security Issues are Present in the World of SCADA?
What are the Consequences of SCADA Failures?
Supply Chain Concerns
Compromised Hardware
Deliberately Corrupted Components
Non-Technical Issues
Tools for Physical Attack and Defense
Electromagnetic Attacks
Covert Activity
Summary
Endnotes
Chapter 7 P sychological Weapons
Social Engineering Explained
Is Social Engineering Science?
SE Tactics Techniques and Procedures (TTPs)
Types of SE Approaches
Types of SE Methodologies
How the Military Approaches Social Engineering
Army Doctrine
How the Military Defends Against Social Engineering
How the Army does CI
An Air Force Approach
Summary
Endnotes
Chapter 8 Computer Network Exploitation
Intelligence and Counter-Intelligence
Sources of Cyber Attacks
Attackers and Sponsors of Attacks
Reconnaissance
Open Source Intelligence
Passive Reconnaissance
Surveillance
Justifications for Surveillance
Advanced Persistent Threat
Voice Surveillance
Data Surveillance
Large-Scale Surveillance Programs
Uses of Surveillance Data
Summary
Endnotes
Chapter 9 Computer Network Attack
Waging War in the Cyber Era
Physically
Electronically
Logically
Reactively vs. Proactively
Time as a Factor
The Attack Process
Recon
Scan
Access
Escalate
Exfiltrate
Assault
Sustain
Obfuscate
Summary
Endnotes
Chapter 10 Computer Network Defense
What We Protect
Confidentiality, Integrity, Availability
Authenticate, Authorize, and Audit
Security Awareness and Training
Awareness
Training
Defending against Cyber Attacks
Policy and Compliance
Surveillance, Data Mining, and Pattern Matching
Intrusion Detection and Prevention
Vulnerability Assessment and Penetration Testing
Disaster Recovery Planning
Defense in Depth
Summary
Endnotes
Chapter 11 Non-State Actors in Computer Network Operations
Individual Actors
Script Kiddies
Malware Authors
Scammers
Blackhats
Hacktivists
Patriot Hackers
Corporations
Motivation for Corporations to Act in Cyber Warfare
Cyber Terrorism
Reasons for Cyber Terrorist Attacks
What Will Happen When We See a Cyber Terrorist Attack?
Organized Cyber Crime
Motivations for Criminal Organizations
Autonomous Actors
Exploratory Systems
Attack Systems
Defensive Systems
Summary
Endnotes
Chapter 12 Legal System Impacts
Legal Systems
International
United States Laws
Criminal Law
Key U.S. Laws
International Trafficking in Arms Regulations
U.S. Cyber Related Laws
Privacy Impacts
Electronic Communications Privacy Act
Digital Forensics
Certification
Summary
Endnotes
Chapter 13 Ethics
Ethics in Cyber Warfare
Use of Force
Intent
Secrecy
Attribution
Bellum Iustum (Just War Theory)
Jus ad Bellum (The Right to Wage War)
Jus in Bello (Proper Conduct in War)
Jus Post Bellum (Justice after War)
Summary
Endnotes
Chapter 14 Cyberspace Challenges
Cybersecurity Issues Defined
Policy
Processes
Technical
Skills
People
Organization
Core (Impacting All Areas)
Interrelationship of Cybersecurity Issues
Way Ahead
Summary
Endnotes
Chapter 15 The Future of Cyber War
Near Term Trends
Most Likely and Most Dangerous Courses of Action
New Technologies and New Problems
International Interactions
Summary
Endnotes
Appendix: Cyber Timeline
Index
● Screenshot ●