This report presents an open source analysis of North Korea’s cyber operations capabilities and its strategic implications for the United States and South Korea. The purpose is to mitigate the current knowledge gap among various academic and policy communities on the topic by synthesizing authoritative and comprehensive open source reference material. The report is divided into three chapters, the first chapter examining North Korea’s cyber strategy. The authors then provide an assessment of North Korea’s cyber operations capabilities by examining the organizational structure, history, and functions of North Korea’s cyber units, their supporting educational training and technology base, and past cyber attacks widely attributed to North Korea. This assessment is followed by a discussion on policy implications for U.S. and ROK policymakers and the larger security community.
Will the world’s next war be fought in cyberspace?
"It's going to happen," said former National Defense University Professor Dan Kuehl.
Continue reading “Zero Day: The Threat In Cyberspace”
"Cypherpunks – liberdade e o futuro da internet" é o primeiro livro de Julian Assange, editor chefe e visionário por trás do Wikileaks, a ser publicado no Brasil com o selo da Boitempo. O livro é resultado de reflexões de Assange com um grupo de pensadores rebeldes e ativistas que atuam nas linhas de frente da batalha em defesa do ciberespaço (Jacob Appelbaum, Andy Müller-Maguhn e Jérémie Zimmermann). Apesar de a internet ter possibilitado verdadeiras revoluções no mundo todo, Assange prevê uma grande onda de repressão, a ponto de considerar a internet como uma possível ameaça à civilização humana devido à transferência do poder de populações inteiras a um complexo de agências de espionagem e seus aliados corporativos transnacionais, que não precisarão prestar contas pelos seus atos. O livro reflete sobre a vigilância em massa, censura e liberdade, mas o principal tema é o movimento cypherpunk, que defendem a utilização da criptografia e métodos similares como meios para provocar mudanças sociais e políticas. Fundado no início dos anos 1990, o movimento atingiu o auge de suas atividades durante as “criptoguerras” e após a censura da Internet em 2011 na Primavera Árabe. Desde junho deste ano, quando conseguiu asilo político na Embaixada do Equador em Londres temendo um revés diplomático que o entregasse às autoridades norte-americanas, Assange tem se dedicado a promover debates sobre a sociedade contemporânea com grandes intelectuais de todo o mundo e foi dentro deste contexto que escreveu Cypherpunks.
Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often referred to as a "Swiss Army knife" utility, and for good reason. Just like the multi-function usefullness of the venerable Swiss Army pocket knife, Netcat's functionality is helpful as both a standalone program and a backe-end tool in a wide range of applications. Some of the many uses of Netcat include port scanning, transferring files, grabbing banners, port listening and redirection, and more nefariously, a backdoor. This is the only book dedicated to comprehensive coverage of the tool's many features, and by the end of this book, you'll discover how Netcat can be one of the most valuable tools in your arsenal.
* Get Up and Running with Netcat Simple yet powerful…Don't let the trouble-free installation and the easy command line belie the fact that Netcat is indeed a potent and powerful program.
* Go PenTesting with Netcat Master Netcat's port scanning and service identification capabilities as well as obtaining Web server application information. Test and verify outbound firewall rules and avoid detection by using antivirus software and the Window Firewall. Also, create a backdoor using Netcat.
* Conduct Enumeration and Scanning with Netcat, Nmap, and More! Netcat's not the only game in town…Learn the process of network of enumeration and scanning, and see how Netcat along with other tools such as Nmap and Scanrand can be used to thoroughly identify all of the assets on your network.
* Banner Grabbing with Netcat Banner grabbing is a simple yet highly effective method of gathering information about a remote target, and can be performed with relative ease with the Netcat utility.
* Explore the Dark Side of Netcat See the various ways Netcat has been used to provide malicious, unauthorized access to their targets. By walking through these methods used to set up backdoor access and circumvent protection mechanisms through the use of Netcat, we can understand how malicious hackers obtain and maintain illegal access. Embrace the dark side of Netcat, so that you may do good deeds later.
* Transfer Files Using Netcat The flexability and simple operation allows Netcat to fill a niche when it comes to moving a file or files in a quick and easy fashion. Encryption is provided via several different avenues including integrated support on some of the more modern Netcat variants, tunneling via third-party tools, or operating system integrated IPsec policies.
* Troubleshoot Your Network with Netcat Examine remote systems using Netat's scanning ability. Test open ports to see if they really are active and see what protocls are on those ports. Communicate with different applications to determine what problems might exist, and gain insight into how to solve these problems.
* Sniff Traffic within a System Use Netcat as a sniffer within a system to collect incoming and outgoing data. Set up Netcat to listen at ports higher than 1023 (the well-known ports), so you can use Netcat even as a normal user.
Continue reading “Netcat Power Tools”
This special edition of DC NEWSMAKERS takes an in-depth look at the incident experts are calling the worst cyber hack in federal government history. Some of the questions people are asking about the breach:
●Why didn’t the government anticipate the attack and try to prevent it?
Continue reading “The OPM Cyber Breach: An in-depth look at the worst cyber attack in government history (In Depth Special Reports Book 1)”