Pages

Friday, December 21, 2012

Our cyber weapon.

If we had a cyber weapon what
would it look like?






This is not an admission of
any activity.

Cyber Scope;
We plug in a IP, and scope probes;
Auto loads appropriate exploits.

Checks if Java on? If yes, loads
Java Exploits.



Barb

Checks IPS & loads exploits, if any.

Checks physical location,
list resources we have,that area.

Checks OS, loads appropriate
exploit.


Checks Browser, checks for 
available traps.


More opsec won't allow.




Cyber missile head;
Loaded exploits for OS,
Java, IPS, and more.

Pay load;
Stage 1#)
Available appropriate exploits.
& bots.

Stage 2#, war head)   
IPT's, APT's, rootkits,
malware,password breakers.




DAMAGE;
Many; from pop-ups to
burning up HD, or blocking
WWW access from hrs to permanent,
over writing data, parts or all.
Or invisible monitoring & reporting,
to Artificial Intelligence BSU's.
http://warintel.blogspot.com/2011/04/real-thinkingself-aware-computer.html

COWS ( cyber over watch ) by BSU's.

COUNTER SURVEILLANCE; 
Also auto checks & monitors  metrics 
for changes in behavior.

Thats part one.

Of course that assumes they tripped
our ROE.


Stuxnet 3.0 most powerful weapon EVER

Gerald 
Tactical Internet Systems analyst.






No comments:

Post a Comment