Index
A
administrative controls
hijacking 162, 163
adversarial theory 2, 3
anomaly detection 42
anonymity networks 201
custom private anonymity networks 202, 203, 204, 205
public networks 201
Antimalware Scan Interface (AMSI) 82
attack and defense competitions 12
attacker infrastructure, defensive perspective
hunting 174
attackers
distracting 138, 139, 140
manipulating 136, 137, 138
tricking 140, 141, 142, 143
attacker techniques
preparing 89, 90, 91
attacker tools, defensive perspective
hunting 174
attack trees 6
authentication 4
authorization 4, 33
AutoBlue-MS17-010
reference link 79
B
backdoored executables
detecting 117, 118
Back Door Factory (BDF) 102
Bash history
clearing 151
Bind9 112
BORG 205
C
C2 detection 111
DNS C2 detection 112
ICMP C2 detection 111
capture the flag (CTF) 12
chattr 170
chroot 171
CIAAAN 3, 4
...