标 签:计算机/网络 信息安全
第1 章计算机网络漏洞利用............................................................. 1
1.1 操作........................................................................................5
1.2 操作目标................................................................................6
1.2.1 战略集合........................................................................7
1.2.2 定向集合........................................................................8
1.2.3 非动能计算机网络攻击(CNA)..........................................9
1.2.4 战略访问......................................................................10
1.2.5 位置访问......................................................................11
1.3 再论CNE.............................................................................12
1.4 计算机网络利用的框架......................................................13
1.4.1 第一原则......................................................................14
1.4.2 原则.............................................................................14
1.4.3 主题.............................................................................17
1.5 小结......................................................................................18
第2 章攻击者...................................................................................19
2.1 人性原则..............................................................................20
2.2 操作的生命周期..................................................................21
2.2.1 第1 阶段:目标锁定.....................................................22
2.2.2 第2 阶段:初始访问.....................................................26
2.2.3 第3 阶段:持久............................................................28
2.2.4 第4 阶段:扩张............................................................29
2.2.5 第5 阶段:渗漏............................................................30
2.2.6 第6 阶段:检测............................................................31
2.3 访问原则..............................................................................31
2.3.1 入站访问......................................................................32
2.3.2 出站访问......................................................................34
2.3.3 双向访问......................................................................41
2.3.4 没有外部访问...............................................................41
2.3.5 访问概述......................................................................43
2.4 经济原则..............................................................................43
2.4.1 时间.............................................................................43
2.4.2 目标定位能力...............................................................44
2.4.3 漏洞利用技能...............................................................44
2.4.4 网络技能......................................................................45
2.4.5 软件开发技能...............................................................45
2.4.6 操作技能......................................................................46
2.4.7 操作分析技能...............................................................47
2.4.8 技术资源......................................................................47
2.5 经济概述..............................................................................48
2.6 攻击者结构..........................................................................48
2.7 小结......................................................................................50
第3 章防御者...................................................................................51
3.1 人性原则..............................................................................52
3.1.1 人性和网络布局............................................................52
3.1.2 人性和安全策略............................................................53
3.2 访问原则..............................................................................55
3.3 防御生命周期......................................................................56
3.4 经济原则..............................................................................58
3.5 有用的防御者......................................................................61
3.6 小结......................................................................................62
第4 章不对称...................................................................................63
4.1 虚假的不对称......................................................................64
4.2 具有优势的攻击者..............................................................69
4.2.1 动机.............................................................................69
4.2.2 主动性.........................................................................70
4.2.3 焦点.............................................................................72
4.2.4 失败的影响..................................................................72
4.2.5 技术知识......................................................................74
4.2.6 对手分析......................................................................75
4.2.7 定制软件......................................................................76
4.2.8 变化率.........................................................................78
4.3 有优势的防御者..................................................................79
4.3.1 网络识别......................................................................79
4.3.2 网络态势......................................................................80
4.4 优势不确定性......................................................................81
4.4.1 时间.............................................................................81
4.4.2 效率.............................................................................82
4.5 小结......................................................................................84
第5 章攻击者摩擦...........................................................................85
5.1 错误......................................................................................86
5.2 复杂性..................................................................................87
5.3 有缺陷的攻击工具..............................................................88
5.4 升级和更新..........................................................................90
5.5 其他攻击者..........................................................................91
5.6 安全社区..............................................................................93
5.7 坏运气..................................................................................95
5.8 小结......................................................................................95
第6 章防御者摩擦...........................................................................97
6.1 错误......................................................................................97
6.2 存在缺陷的软件..................................................................99
6.3 惯性....................................................................................102
6.4 安全社区............................................................................103
6.5 复杂性................................................................................104
6.6 用户....................................................................................106
6.7 坏运气................................................................................107
6.8 小结....................................................................................108
第7 章进攻战略.............................................................................109
7.1 原则1:知识.....................................................................111
7.2 原则2:意识.....................................................................114
7.3 原则3:创新.....................................................................116
7.3.1 衡量创新....................................................................117
7.3.2 防御创新....................................................................117
7.4 原则4:预防.....................................................................120
7.5 原则5:操作安全.............................................................125
7.5.1 使暴露最小化.............................................................126
7.5.2 使识别最小化.............................................................126
7.5.3 控制反应....................................................................128
7.5.4 衡量操作安全.............................................................129
7.6 原则6:程序安全.............................................................130
7.6.1 攻击者负债................................................................131
7.6.2 程序安全成本.............................................................133
7.6.3 衡量程序安全.............................................................142
7.7 制定进攻战略....................................................................144
7.8 模块化框架........................................................................147
7.9 战术决策中的注意点........................................................149
7.10 小结..................................................................................151
第8 章防御战略.............................................................................153
8.1 失败的战术........................................................................154
8.1.1 反病毒和基于签名的检测............................................154
8.1.2 密码策略....................................................................157
8.1.3 用户培训....................................................................160
8.2 指定防御战略....................................................................161
8.3 基于云的安全性................................................................171
8.4 小结....................................................................................173
第9 章进攻案例研究.....................................................................175
9.1Stuxnet................................................................................176
9.1.1 访问...........................................................................177
9.1.2 经济...........................................................................178
9.1.3 人性...........................................................................178
9.1.4 知识...........................................................................178
9.1.5 意识...........................................................................179
9.1.6 预防...........................................................................179
9.1.7 创新...........................................................................180
9.1.8 操作安全....................................................................181
9.1.9 程序安全....................................................................183
9.1.10 Stuxnet 小结..............................................................184
9.2Flame..................................................................................184
9.3 Gauss..................................................................................188
9.4 Dragonfly........................................................................... 190
9.5 小结....................................................................................192
结语..............................................................................................193
附录A 攻击工具.............................................................................195
参考书目.............................................................................................209
参考文献.............................................................................................217
装 帧:平装