Search This Blog

Populære indlæg

Tuesday, September 15, 2015

cyberunit - building an effective one

these are my thoughts (so far) on how to create an effective cyber-unit or hacker group:

*****************
*** cyberunit ***
*****************

authorities versus specialists
==============================

an authority has expert level knowledge on a specific topic, this can be but not limited to php, mysql, zap and so on.
a specialist is able to utilize any technique as a weapon (ie. for military use)

the authority-people handles long term strategy whereas the specialist people takes care of the tactical situations that may arise. 

overview of the unit
====================

to know who is best suited to a specific task record information on who has most knowledge of different areas, like php, zap, shell-scripts, etc.
who has the best skills (ie hands-on) with specific software.
what area would the member best like to strengthen and what agitates them doing.

tactical layer
==============

handles mission planning since this is recon, attack, recon, attack and so on they decide best path to cut down time consumed on decision making.

strategic layer
===============

handles long term campaigns, choosing overall targets and choosing which areas - new techniques, example - internal knowledge that should receive focus.

wolfpack tactic
===============

this should make the basis for an unit that employs wolfpack tactics. it is so easy (with shared info on shared "hack"-servers) to add new personnel to an ongoing mission. and since everyone is making their own decisions within mission paramaters this is a very effeective method of organization. furthermore one can always re-assign unit members so that the strongest unit is presented for each "project".
every single member of the wolfpack knows the other members strengths and weaknesses. this tactic utilizes the way wolfpacks hunt.

shark tactic
============

get the target to focus attention on a single point and then attack (more or less) at random imitating a group of sharks floating by and each ripping a piece out of the target.

burst-fire hacking
==================

using the terminal can be tedious (you have to type a lot) so use scripts, aliases, functions and environment variables. also use tabs to seperate different tasks. it's easier to remember TARGET_IP_PRIMARY and TARGET_IP_SECONDARY than which ip is which target.

tools of the trade
==================

the computer is the gun and software the little pieces of ammunition you load it with. the os is more like a toolbox. a "hack"-server is a good idea to have running. it runs the software utilized by the unit and one connects to the servers and use port#'s to select the piece of program used.

old school techniques
=====================

you don't need a classy piece of software to send an email from everyone to everyone (you need access to the targets inbox to read any reply) just a smtp-gate and telnet.

it is paramount that info on techniques and related knowledge is shared widely and freely within the group to make everyone stronger.

No comments:

Post a Comment