Our cyber weapon.
would it look like?
This is not an admission of
We plug in a IP, and scope probes;
Auto loads appropriate exploits.
Checks if Java on? If yes, loads
Checks IPS & loads exploits, if any.
Checks physical location,
list resources we have,that area.
Checks OS, loads appropriate
Checks Browser, checks for
More opsec won't allow.
Cyber missile head;
Loaded exploits for OS,
Java, IPS, and more.
Available appropriate exploits.
Stage 2#, war head)
IPT's, APT's, rootkits,
Many; from pop-ups to
burning up HD, or blocking
WWW access from hrs to permanent,
over writing data, parts or all.
Or invisible monitoring & reporting,
to Artificial Intelligence BSU's.
COWS ( cyber over watch ) by BSU's.
Also auto checks & monitors metrics
for changes in behavior.
Thats part one.
Of course that assumes they tripped
|Stuxnet 3.0 most powerful weapon EVER|
Tactical Internet Systems analyst.