Our cyber weapon.
If we had a cyber weapon what
would it look like?
This is not an admission of
any activity.
Cyber Scope;
We plug in a IP, and scope probes;
Auto loads appropriate exploits.
Checks if Java on? If yes, loads
Java Exploits.
Checks IPS & loads exploits, if any.
Checks physical location,
list resources we have,that area.
Checks OS, loads appropriate
exploit.
Checks Browser, checks for
available traps.
More opsec won't allow.
Cyber missile head;
Loaded exploits for OS,
Java, IPS, and more.
Pay load;
Stage 1#)
Available appropriate exploits.
& bots.
Stage 2#, war head)
IPT's, APT's, rootkits,
malware,password breakers.
DAMAGE;
Many; from pop-ups to
burning up HD, or blocking
WWW access from hrs to permanent,
over writing data, parts or all.
Or invisible monitoring & reporting,
to Artificial Intelligence BSU's.
http://warintel.blogspot.com/2011/04/real-thinkingself-aware-computer.html
COWS ( cyber over watch ) by BSU's.
COUNTER SURVEILLANCE;
Also auto checks & monitors metrics
for changes in behavior.
Thats part one.
Of course that assumes they tripped
our ROE.
Gerald
Tactical Internet Systems analyst.
would it look like?
This is not an admission of
any activity.
Cyber Scope;
We plug in a IP, and scope probes;
Auto loads appropriate exploits.
Checks if Java on? If yes, loads
Java Exploits.
Barb
Checks IPS & loads exploits, if any.
Checks physical location,
list resources we have,that area.
Checks OS, loads appropriate
exploit.
Checks Browser, checks for
available traps.
More opsec won't allow.
Cyber missile head;
Loaded exploits for OS,
Java, IPS, and more.
Pay load;
Stage 1#)
Available appropriate exploits.
& bots.
Stage 2#, war head)
IPT's, APT's, rootkits,
malware,password breakers.
DAMAGE;
Many; from pop-ups to
burning up HD, or blocking
WWW access from hrs to permanent,
over writing data, parts or all.
Or invisible monitoring & reporting,
to Artificial Intelligence BSU's.
http://warintel.blogspot.com/2011/04/real-thinkingself-aware-computer.html
COWS ( cyber over watch ) by BSU's.
COUNTER SURVEILLANCE;
Also auto checks & monitors metrics
for changes in behavior.
Thats part one.
Of course that assumes they tripped
our ROE.
Stuxnet 3.0 most powerful weapon EVER |
Gerald
Tactical Internet Systems analyst.
0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home