Quote of the day—Iain Thomson

NSA tiger teams follow a six-stage process when attempting to crack a target, he explained. These are reconnaissance, initial exploitation, establish persistence, install tools, move laterally, and then collect, exfiltrate and exploit the data.

During the reconnaissance phase agents examine a network electronically and, in some cases, physically. They work out who the key personnel are, what email accounts matter, how far the network extends, and maintain constant surveillance until they can find a way in.

Iain Thomson
January 28, 2016
NSA’s top hacking boss explains how to protect your network from his attack squads
[Via Bruce Schneier. See also NSA Hacker Chief Explains How to Keep Him Out of Your System.

Most of this process applies to physical as well as information security. Use this information wisely.—Joe]

Share

4 thoughts on “Quote of the day—Iain Thomson

      • Also, never encrypt or decrypt on an electronic device. Use paper and pencil, and burn them when you’re done.

Comments are closed.