Nis Microproject
Nis Microproject
An Introduction :
Cyber Operations is an interdisciplinary major encompassing the entire scope of
cyberspace and related operations that are both technical and non-technical (i.e.,
ethical, legal, human-centered, etc.) in nature. Cyber Operations is a
complementary discipline to Cybersecurity. Cyber Operations places a particular
emphasis on technologies and techniques applicable to all operational and system
levels. Coursework in Cyber Operations balances theory, practice and hands-on
labs inspired by real-life scenarios. Skills and competencies emphasized are in
system attack, infiltration, exploitation, defense, mitigation, and recovery
The internet has made the world smaller in many ways but it has also opened us up
to influences that have never before been so varied and so challenging. As fast as
security grew, the hacking world grew faster. There are two ways of looking at
the issue of cyber security. One is that the companies that provide cloud computing
do that and only that so these companies will be extremely well secured with the
latest in cutting edge encryption technology
Vulnerabilities :
For a computer or network, a vulnerability is an aspect of the system that can be
used to compromise that system (for illustrative vulnerabilities,see the Appendix).
“Compromise” is used here as a verb meaning to attack or exploit. Weaknesses
may be introduced accidentally through design or implementation flaws. A defect
or “bug” may open the door for opportunistic use of that vulnerability by an
adversary. Many vulnerabilities are widely publicized after discovery and may be
used by anyone with moderate technical skills until a patch can be disseminated
and installed. Adversaries with the time and resources may also discover
unintentional defects that they protect as valuable secrets, also known as zero-
day exploits. As long as those defects go unaddressed, the vulnerabilities they
create may be used by adversaries. Vulnerabilities may also be introduced
intentionally. Of course, vulnerabilities are of no use to an adversary unless the
adversary knows they are present on the system or on the network being
compromised. But an adversary may have some special way of finding
vulnerabilities, and nation states in particular often have special advantages in
doing so. For example, although proprietary software producers jealously protect
their source codes as intellectual property upon which their businesses are
dependent, some such producers are known to provide source code access to
governments under certain conditions. Availability of source code for inspection
increases the likelihood that the inspecting party will be able to identify
vulnerabilities not known to the general public. Furthermore, through covert and
nonpublic channels, nation states may even be able topersuade vendors or willing
employees of those vendors to insert vulnerabilities – secret “back doors” – into
commercially available products(or require such insertion as a condition of export
approval), by appealing to their patriotism or ideology, by bribing, blackmailing, or
extorting them, or by applying political pressure.
Access :
In order to take advantage of a vulnerability, an adversary must have access to it.
Targets that are “easy” to compromise are those that involve relatively little
preparation on the part of the adversary and where access to the target can be
gained without much difficulty, such as a target that is known to be connected to
the Internet. “Difficult” targets require a great deal of preparation on the part of
the adversary, and access to the target can be gained only with great effort, or
may even be impossible for all practical purposes. For example, the onboard
avionics of an adversary’s fighter plane are not likely to be connected to the
Internet for the foreseeable future, which means that launching a cyber attack
against it will require some kind of close access to introduce a vulnerability that
can be used later. In general, it would be expected that an adversary’s important
and sensitive computer systems or networks would fall into the category of
difficult targets.Access paths to a target may be intermittent. For example, a
submarine’s on-board administrative local area network would necessarily be
disconnected from the Internet while underwater at sea but might be connected
to the Internet while in port. If the administrative network is ever connected at
sea to the on-board operational network, which controls weapons and
propulsion, a useful though intermittent access path may be present for an
adversary.Access paths to a target can suggest a way of differentiating between
two categories of compromise:
Payload :
“Payload” is the term used to describe the things that can be done once a
vulnerability has been exploited. For example, once a software agent, such as a
virus, has entered a given computer, it can be programmed to do many things –
reproduce and retransmit itself, and destroy or alter files on the system. Payloads
can have multiple capabilities when inserted into an adversary system or network;
they can be programmed to do more than one thing. The timing of these actions
can also be varied, and if a communications channel to the adversary is available,
payloads may be remotely updated. Indeed, in some cases, the initially delivered
payload consists of nothing more than a mechanism for scanning the system to
determine its technical characteristics and another mechanism through which the
adversary can deliver the best software updates to further the compromise.
Effects :
Cyber exploitations target the confidentiality of information stored on or passing
through a system or a network. Under normal circumstances, such information
should be available only to authorized parties. A successful cyberexploitation
compromises the confidentiality of such information and makes the information
available to the adversary. Cyber attacks (as opposed to cyberexploitations) target
one of several attributes of these components or devices and seek to cause a loss
of integrity, a loss of authenticity, or a loss of availability, which includes theft
of services:
Integrity: A compromise of integrity refers to the alteration of
information (a computer program, data, or both) so that under some
circumstances of operation, the computer system does not provide the
accurate results or information that one would normally expect even
though the system may continue to operate.
Authenticity: A compromise of authenticity obscures or forges the
source of a given piece of information. A message whose authenticity
has been compromised will fool a recipient into thinking it was properly
sent by the asserted originator.
Availability: A compromise in availability means that the functionality
provided by the target system or network is not available to the user:
email sent by the targeted user does not go through, the target user’s
computer simply freezes, or the response time for that computer
becomes intolerably long, possibly leading to catastrophe if a physical
process is being controlled by the system.
The compromises above are direct effects of a cyber attack. In addition,
cyber attacks may result in indirect effects on the systems and (or) devices that
the attacked computer system or network controls or interacts with, or on the
people who use or rely on the attacked computer system or network. For
example, an adversary’s electric power grid may be controlled by computer. An
attack on the grid’s computers may have effects on the power grid itself – indeed,
producing those indirect effects on the grid may be the primary purpose of the
attack. Furthermore, because virtually anything can be connected to a computer
system or network, the scope and nature of effects resulting from a cyber attack
can span an enormous range. The indirect effects of a cyber attack are almost
always more important to the attacker than the direct effects, although both
direct and indirect effects must be taken into account when ascertaining the
significance of a cyber attack.
Metasploit :
Metasploit is a popular penetration testing tool that comes preinstalled on Kali
systems. It is composed of separate tools, including msfconsole, the core
interactive text program that allows a user to interact with the different
Metasploit components; and msfvenom, which is used to generate payloads and
stand-alone malware.There are graphical user interfaces available for Metasploit;
one popular tool available on Kali is Armitage.Metasploit is a modular tool and
separates the exploit, which attacks the vulnerable target, from the payload,
which is what is run on the target after a successful exploit. Metasploit also
provides separate auxiliary modules, many of which are used for network
discovery; and post-exploitation modules, which are run on targets after a
successful exploit, often to escalate privileges on the target
B. Operational purpose
The experts emphasized that the characteristics, operational approaches and
impacts of cyber attacks could vary widely depending on the purpose of the
operation and the tools and techniques employed. They noted that the most
common operations were conducted for purposes of reconnaissance, surveillance
and the exfiltration of data and information (for espionage or other purposes,
often referred to as computer network exploitation (CNE)) and would usually
involve gaining access to, and often maintaining a persistent presence on, the
targeted system or device. These operations are generally designed to avoid
detection and are not aimed at harming the targeted system or device, which
could nevertheless be disrupted or destroyed unintentionally.
E. Evolving nature of the threat actors and the growing attack surface
The experts noted the wide range of actors carrying out cyber operations:
individual hackers; criminal groups, potentially motivated by financial gain; States;
non-State armed groups; and other non-State actors. Furthermore, various actors
may cooperate, whether it be State alliances, States supporting groups, or
criminal groups selling cyber capabilities to other actors. Some of the active
sophisticated actors are known under the term advanced persistent threats
(APTs), namely threat actors that establish a persistent, long-term access to the
targeted system(s).