Cyber Terrorism Research Papers - Academia.edu (original) (raw)

Violent extremist groups from a wide variety of backgrounds have long been recognized to be making extensive use of the internet. However, assessments of the cyber-terrorist threat have often been wastefully focused on issues and concerns... more

Violent extremist groups from a wide variety of backgrounds have long been recognized to be making extensive use of the internet. However, assessments of the cyber-terrorist threat have often been wastefully focused on issues and concerns which do not match fully with the reality of how terrorists are currently interested in the internet or on what activities such individuals and groups are actually engaged in. Instead, the main concern has been on what terrorists might do, especially with regard to information warfare. Such a heavy focus on possibilities is misguided and overlooks the substantial manner in which the internet is already being exploited by various extremists. Rather, much more serious issues are raised by the way in which terrorist organisations are currently and demonstrably using the internet to recruit new members, generate international support, raise and launder funds, and to share information and knowledge with similar groups

In 2001, the Convention on Cybercrime of the Council of Europe, also known as the Cybercrime Convention or the Budapest Convention, became the first binding international instrument to foster a common criminal policy and international... more

In 2001, the Convention on Cybercrime of the Council of Europe, also known as the Cybercrime Convention or the Budapest Convention, became the first binding international instrument to foster a common criminal policy and international cooperation to battle cybercrime in signatory States. Whether or not India should join the Convention has, since then, been a topic of intense debate. In this paper, the author considers the Convention’s major strengths and weaknesses in five areas of crucial importance to Indian stakeholders. To sign or not? There might not be an easy answer, as this paper will show.

This chapter looks at why cyber-security is considered one of the key national security issues of our times. The first section provides the necessary technical background information. The second unravels three different, but interrelated... more

This chapter looks at why cyber-security is considered one of the key national security issues of our times. The first section provides the necessary technical background information. The second unravels three different, but interrelated ways to look at cyber-security: the first discourse has a technical focus and is about viruses and worms. The second looks at the interrelationship between the phenomenon of cyber-crime and cyber-espionage. The third turns to a military and civil defence-driven discourse about the double-edged sword of fighting wars in the information domain and the need for critical infrastructure protection. Based on this, the third section looks at selected protection concepts from each of the three discourses. The final section sets the threat into perspective: despite heightened media attention and a general feeling of impending cyber-doom in some government circles, the level of cyber-risk is generally overstated

DDoS (Distributed Denial-of-Service) attacks greatly affect the internet users, but mostly it's a catastrophe for the organization in terms of business productivity and financial cost. During the DDoS attack, the network log file rapidly... more

DDoS (Distributed Denial-of-Service) attacks greatly affect the internet users, but mostly it's a catastrophe for the organization in terms of business productivity and financial cost. During the DDoS attack, the network log file rapidly increases and using forensics traditional framework make it almost impossible for DDoS forensics investigation to succeed. This paper mainly focuses on finding the most suitable techniques, tools, and frameworks in big data analytics that help forensics investigation to successfully identify DDoS attacks. This paper reviewed numbers of previous research that related to the topic to find and understand general terms, challenges and opportunities of using big data in forensics investigation. The data mining tools used in this paper for simulation was RapidMiner because of its ability to prepare the data before the analysis and optimizes it for quicker subsequent processing, and the dataset used was taken from University of New Brunswick's website. Algorithms that were used to evaluate the DDoS attack training dataset are Naïve Bayes, Decision Tree, Gradient Boost and Random Forest. The evaluation results projected that the majority of algorithms has above 90% of accuracy, precision and recall respectively. Using the data mining tools and recommended algorithms will help reduce processing time associated with data analysis, reduce cost and improve the quality of information. Future research is recommended to install in an actual network environment for different DDoS detection models and compare the efficiency and accuracy in real attacks.

Rewolucje technologiczne są ważnym elementem postępu ludzkości mając wpływ zarówno na pokojowe rozwiązania służące cywilizacjom, jak i konflikty zbrojne. Zaawansowane technologie doprowadziły do gruntownych zmian w relacjach pomiędzy... more

Rewolucje technologiczne są ważnym elementem postępu ludzkości mając wpływ zarówno na pokojowe rozwiązania służące cywilizacjom, jak i konflikty zbrojne. Zaawansowane technologie doprowadziły do gruntownych zmian w relacjach pomiędzy państwami, a pojawienie się m.in. broni jądrowej jest jednym z wielu przykładów, gdzie rozwój militarny miał wpływ na budowanie potęgi poszczególnych mocarstw. Współczesne wyzwania dla bezpieczeństwa są związane m.in. z zagrożeniami hybrydowymi, dezinformacją oraz szkodliwym wykorzystywaniem nowych technologii, w tym sztucznej inteligencji (SI).

The password is the most widely used identity verification method in computer security domain. However, due to its simplicity, it is vulnerable to imposters. A way to strengthen the password is to combine Biometric technology with... more

The password is the most widely used identity verification method in computer security domain. However, due to its simplicity, it is vulnerable to imposters. A way to strengthen the password is to combine Biometric technology with password. Keystroke dynamics is one of the behavioural biometric approaches which is cheaper and does not require any sophisticated hardware other than the keyboard. The chapter uses a new feature called Virtual Key Force along with the commonly extracted timing features. Features are normalized using Z-Score method. For feature subset selection, Particle Swarm Optimization wrapped with Extreme Learning Machine is proposed. Classification is done with wrapper based PSO-ELM approach. The proposed methodology is tested with publically available benchmark dataset and real time dataset. The proposed method yields the average accuracy of 97.92% and takes less training and testing time when compared with the traditional Back Propagation Neural Network.

The presence of extremist and radical groups on internet is an old phenomenon as they have been manifesting their appearance in cyber space since their very own inception. However, their dependency in cyberspace operations has enormously... more

The presence of extremist and radical groups on internet is an old phenomenon as they have been manifesting their appearance in cyber space since their very own inception. However, their dependency in cyberspace operations has enormously expanded since last two decades. The cyber terrorism threat has evolved into a multi-faceted and complex riddle where various ideological dogmas are turning the world into a cyber-war. By 2000, all terrorist groups virtually had set up their online presence. This study aims to map cyber space activities conducted by terrorist organizations operating in Pakistan. How terrorist organizations are making their presence online and how do these outfits use social media for assistance and execution of terrorist attacks. The study tries to delineate case study of four terrorist organizations; Islamic State (IS), Jamat Ud Dawa (JuD), Lashker-e-Tayyaba (LeT), and Balochistan Liberation Army (BLA). The study will explore how do these organizations use cyber space for fundraising, online recruitment, psychological warfare, propaganda, and information-sharing. It will discuss existing laws in Pakistan related to cyber terrorism, challenges and a way forward.

Perkembangan terorisme pada dunia modern integral dengan globalisasi dan perkembangan teknologi komunikasi dan informasi. Hak akan kebebasan untuk memperoleh, mengelola dan menyebarkan informasi apa yang diinginkan oleh individu maupun... more

Perkembangan terorisme pada dunia modern integral dengan globalisasi dan perkembangan teknologi komunikasi dan informasi. Hak akan kebebasan untuk memperoleh, mengelola dan menyebarkan informasi apa yang diinginkan oleh individu maupun kelompok, kemudian menjadi ancaman bagi negara. Kebebasan yang diinginkan oleh mayoritas masyarakat ini, setara dengan konsekuensi yang akan diterima. Salah satunya, penggunaan teknologi dan kanalisasi pembangunan opini melalui media sosial juga digunakan oleh kelompok radikal untuk mengembangkan sayap pengaruhnya dan penanaman paham radikal. Melalui media sosial juga individu mendapatkan akses untuk melakukan " radikalisasi diri sendiri " atau kemudian dikenal dengan " Self Radicalization ". Perkembangan teknologi juga yang menstimulasi kelompok maupun individu radikal memiliki akses untuk mendapatkan informasi dan cara untuk me-realisasikan ide radikalnya, yang kemudian menjadi aksi terorisme. Berkaca dari globalisasi radikalisme yang sukses dilakukan oleh kelompok radikal ISIS, maka perkembangan teknologi informasi sudah jelas merupakan paradoks dalam globalisasi. Sebagai bukti terhitung dari tahun 2011, individu berasal lebih dari 100 negara, bermigrasi ke daerah konflik Syiria dan Irak. 1 Dalam beberapa akun telegram yang penulis telusuri, banyak dari individu atau kelompok radikal yang tidak melihat batas wilayah sebagai penghambat membangun apa yang kemudian penulis sebut " Muslim Radical Brotherhood ". 2

Twenty years after the 9/11 attacks, stereotypes that associate Muslims with terrorism go far beyond depictions in newspapers and television. Recent research raises the alarm about rampant Islamophobia in digital spaces, particularly... more

Twenty years after the 9/11 attacks, stereotypes that associate Muslims with terrorism go far beyond depictions in newspapers and television. Recent research raises the alarm about rampant Islamophobia in digital spaces, particularly far-right groups’ use of disinformation and other manipulation tactics to vilify Muslims and their faith.

Il libro si presenta come una critica ai nuovi media, soffermandosi in particolare sull'eccitazione nata attorno a Internet e dalla speranza che questo strumento avrebbe favorito l'apertura delle società chiuse e sconfitto gli... more

Il libro si presenta come una critica ai nuovi media, soffermandosi in particolare sull'eccitazione nata attorno a Internet e dalla speranza che questo strumento avrebbe favorito l'apertura delle società chiuse e sconfitto gli autoritarismi. L'autore cerca di confutare la convinzione cyberutopistica di chi crede che Internet da solo possa liberare il mondo dalle dittature e dalle censure. Questo documento è esplicativo di ciò che contiene il libro e serve a fornire i concetti chiave per lo studio dei nuovi media.

Questo lavoro si prefigge di ricostruire i contenuti e i profili problematici principali della legislazione penale sostanziale di contrasto alla propaganda jihadista online in Francia. La scelta di quest’ultimo Paese come oggetto... more

Questo lavoro si prefigge di ricostruire i contenuti e i profili problematici
principali della legislazione penale sostanziale di contrasto alla propaganda jihadista online in Francia. La scelta di quest’ultimo Paese come oggetto dell’indagine è dovuta ai recenti interventi del legislatore nazionale diretti a colpire proprio il fenomeno della propaganda jihadista: interventi, questi, che si inscrivono nell’odierna tendenza a disciplinare con norme penali ad hoc – siano esse circostanze aggravanti o addirittura fattispecie incriminatrici autonome – l’istigazione al terrorismo e l’apologia di quest’ultimo nel mondo digitale. Nella prima parte del lavoro verrà delimitato l’oggetto dell’indagine,
accennando brevemente alla intricata questione definitoria del concetto di cyberterrorismo e selezionando tra il ventaglio di nozioni elaborate dalla dottrina quella maggiormente ritagliata sul contenuto delle normative analizzate in questa sede (dirette, per l’appunto, a contrastare la diffusione online dell’ideologia jihadista e i suoi potenziali effetti radicalizzanti: par. 1). Nella seconda parte si illustrerà sinteticamente l’importanza della propaganda online nell’ambito del terrorismo fondamentalista (par. 2). Nella terza parte si passeranno poi in rassegna i caratteri comuni alle previsioni penali di settore (par. 3) e quelli
peculiari delle fattispecie introdotte in Francia nell’ambito di questa sottocategoria della criminalità cyber-terroristica (par. 4). Nella parte conclusiva si effettueranno alcune annotazioni critiche attorno ai
recenti trends involutivi del diritto penale antiterrorismo d’oltralpe e al potenziale significato, in chiave comparata, delle prime importanti reazioni della Corte costituzionale francese per smorzare le derive sempre più apertamente nemicali del diritto antiterrorismo stesso (par. 5).

Among various cyber threats, a DDoS attack is one of the major Internet threats that can affect anyone and even cause tremendous financial damage to organization that uses cloud-based services, while the mitigation of this threat can be... more

Among various cyber threats, a DDoS attack is one of the major Internet threats that can affect anyone and even cause tremendous financial damage to organization that uses cloud-based services, while the mitigation of this threat can be highly difficult considering the complex infrastructure that it uses to perform its malicious activities. For that purpose it’s important to think proactively rather than reactively when addressing the protection against this type of attacks. The overview of botnets and some of the countermeasures against this threat were discussed in this paper.

The Fifth Dimension of Conflictuality: The Rise of Cyberspace and Its Effects on In- ternational Politics Cyberspace has become a crucial element for political, social, financial and individual activities. The Information and... more

The Fifth Dimension of Conflictuality: The Rise of Cyberspace and Its Effects on In- ternational Politics
Cyberspace has become a crucial element for political, social, financial and individual activities. The Information and Communication Technologies (ICT) have enhanced the human interactions and have contributed to “reinvent” classical concepts such as political participation, political debate, decision-making. However, their all-encom- passing, ubiquitous nature and their growing use for political and military purposes poses significant risks to international peace, stability and security. The low barrier of access to ICT capabilities, the speed of technological advances and the complexity of the cyberspace environment with regard to traditional legal definitions of borders have presented new challenges to States (the main actors of international relations) such as the inherent complexity of accurately attributing cyber-attacks. It is both this complexity and the frequent insistence of parties to attribute cyber-attacks and incidents “beyond a reasonable doubt” that gives one the ability to deny responsibility and frustrate attempts to build trust and political rapport in cyberspace. The purpose of this research is to analyze how cyberspace affects the international politics. The nature of the topic dictates the use of qualitative analysis of primary and secondary sources such as official reports, declarations and policy documents, and academic analysis, in order to understand effects and dynamics carried out by the cyber domain on classical concepts such as war, peace and international relations. The main idea of this research is that the development of Information and Communication Technolo- gies (ICTs) and the related (r)evolution of warfare have produced relevant effects on the dynamics of the contemporary international system highlighting, at the same time, how the militarization of the cyber domain has posed consequences on interna- tional security, peace and stability. However, the lack of specific research related to “cyberspace’s effects on international politics” highlights the need to devote more attention on this topic bearing in mind that, more extensive and enduring analysis on cyberspace’s dynamics might allowed policy makers the opportunity to improve
awareness related to cyber threats in order to governing challenges emerging from the digital sphere.

"Com a utilização maciça das tecnologias de informação, processamento e comunicação as policias de investigação criminal são levadas a exercer as suas competências de prevenção e de investigação criminal nesse espaço comunicacional. A... more

"Com a utilização maciça das tecnologias de informação, processamento e comunicação as policias de investigação criminal são levadas a exercer as suas competências de prevenção e de investigação criminal nesse espaço comunicacional.
A recolha de informação criminal em fontes abertas constitui uma importante ferramenta policial, mas a falta de definições legais nos sistemas jurídicos penais na Europa, pode suscitar, mesmo que por mera cautela, enquadramentos jurídicos restritivos por gabinetes e por assessores jurídicos, que levem ao abandono da exploração de algumas importantes fontes de informação.
Para tal, oferece-se uma visão sobre o tema, que permita lançar as bases para a criação de doutrina acerca de "fontes abertas."

The risk posed by terrorist use of cyber technology and cyber terrorism have been of great concern to politicians, decision makers, security officials. This article studies terrorist use of cyber technology and cyber terrorism along with... more

The risk posed by terrorist use of cyber technology and cyber terrorism have been of great concern to politicians, decision makers, security officials. This article studies terrorist use of cyber technology and cyber terrorism along with history of cyber-terrorism. Moreover some concepts such as between cyber-crime, cyber-terrorism, cyber-warfare and hactivism will be analysed. Furthermore, the challenges faced by international organisations in tackling cyber terrorism will be discussed; measures introduced in some countries to address cyber terrorism treats are presented as well as discussions on the present and the future treat posed by cyber terrorism and terrorist use of cyber technology.

"Violent Extremism", a word that can quiver a whole country or society entirely and affect in its foundation so much that its socioeconomic system can be broken down entirely. Bangladesh is also at high risk situation as there are some... more

"Violent Extremism", a word that can quiver a whole country or society entirely and affect in its foundation so much that its socioeconomic system can be broken down entirely. Bangladesh is also at high risk situation as there are some religious extremist groups active around our motherland to spread hate speech and misinterpretation of divine religion so that there could be chaos and terrorist acts to break the social order. The purpose of this study was to find out how social media is being used for spreading violent extremism ideologies in Bangladesh. The authors mainly collected the data from newspapers, books, articles, journals, reports of DMP and other social organisations. As such, this paper is an in-depth study of the relationship between social media and spreading of violent extremism and it aims to assess the precedential effect of social media in spreading violent extremism. The authors have found that the national and international extremist groups are using social media sites to express their propaganda, misinterpretations of divine messages and hate speeches to the mass majority who use those sites so that people can be misguided and fulfil the objectives of those groups.

Cyberspace, called the new field of terrorism, is a transition zone from traditional terrorism to cyber-terrorism. The concept of cyber terrorism created by the combination of the words cyber and terrorism that generates a great risk... more

Cyberspace, called the new field of terrorism, is a transition zone from traditional terrorism to cyber-terrorism. The concept of cyber terrorism created by the combination of the words cyber and terrorism that generates a great risk environment in a world that is increasingly dependent on technology. Terrorist groups that take advantage of the opportunities for unlimited, anonymous and low-cost cyberspace are easily adapted to cyberspace and try to achieve their goals of radicalization through methods such as propaganda and recruitment. In a digitized world, it is possible that terrorist organizations will gain strength and endanger the national security of states by carrying out major cyber attacks.

Pepetela (Artur Carlos Maurício Pestana dos Santos) El terrorista de Berkeley, California © Pepetela (Artur Carlos Maurício Pestana dos Santos) © Rodolfo Alpízar Castillo (de la traducción) © Jerónimo Pizarro (del prólogo) © Taller de... more

Pepetela (Artur Carlos Maurício Pestana dos Santos)
El terrorista de Berkeley, California
© Pepetela (Artur Carlos Maurício Pestana dos Santos)
© Rodolfo Alpízar Castillo (de la traducción)
© Jerónimo Pizarro (del prólogo)
© Taller de Edición • Rocca® SAS (de la presente edición)
Título original: O terrorista de Berkeley, Califórnia
Título en español: El terrorista de Berkeley, California
Primera edición y traducción al español: La Habana, Cuba, 2012
Primera edición en Colombia: octubre de 2018 Bogotá, D. C. Colombia
ISBN: 978-958-5445-21-5
Editor general: Luis Daniel Rocca Lynn
Coordinación editorial: Gabriela Rocca Barrenechea
Revisión de textos: Juanita Rocca Toro - Camila Rocca Toro
Diseño y diagramación: Juan Pablo Rocca Barrenechea - Nathalia A. García P.
Fotografía de portada: Intervención sobre una fotografia de Calibas. Detalle del puente Golden Gate.
Jerónimo Pizarro: asesor de la colección oUtras letras, Taller de Edición • Rocca®

This paper reflects on the articles submitted for the Symposium Confronting the Internet's Dark Side. I discuss some of the criticisms of the book's theory and my treatment of hate speech. The responsibilities of Internet Service... more

This paper reflects on the articles submitted for the Symposium Confronting the Internet's Dark Side. I discuss some of the criticisms of the book's theory and my treatment of hate speech. The responsibilities of Internet Service Providers (ISPs) and Web-Hosting Services (WHSs) are in the fore, arguing that as they are the gatekeepers, they need to be proactive far more than they are now. This paper, like my book, strives to suggest an approach that harnesses the strengths and capabilities of the public and the private sectors in offering practical solutions to pressing problems.

In this modern era, the representation of Islam and terrorism in Western media has been a contentious topic of multiple implications. This project entails a comprehensive analysis of the impact that the news media has had on the portrayal... more

In this modern era, the representation of Islam and terrorism in Western media has been a contentious topic of multiple implications. This project entails a comprehensive analysis of the impact that the news media has had on the portrayal of Muslims and Islam. The goal is to offer a more-inclusive insight into the media coverage of jihad which led to the hijacking of the notion of jihad by Western mainstream media as well as a seemingly unfair representation of an entire nation. I will attempt to offer a rather detailed account on the terms “Islamist” and “jihad” as per their usage by the mainstream media. Furthermore, it will scrutinise the role of the media as a platform for neo-jihadis. This paper will endeavour to answer the following question: Firstly, has the concept of Jihad and the religion of Islam been overtaken by the Western media? Secondly, is the representation of Muslims in the mainstream Western media within an Islamophobic context? And finally, to what extent have the media policies and issues of censorship impacted the portrayal of Muslims and Islam in the media? Along with attempting to present a contextually informed answer to this question, this research will further touch upon the Impact of Orientalism on Islam and shed light on the guidelines and policies followed by media corporations with regards to conveying acts of terrorism.

This paper analyzes the US cyber-terror discourse from a constructivist security studies angle. For some years, experts and government officials have warned of cyber-terrorism as a looming threat to national security. However, if we... more

This paper analyzes the US cyber-terror discourse from a constructivist security studies angle. For some years, experts and government officials have warned of cyber-terrorism as a looming threat to national security. However, if we define cyber-terror as an attack or series of attacks that is carried out by terrorists, that instills fear by effects that are destructive or disruptive, and that has a political, religious, or ideological motivation, then none of the disruptive cyber-incidents of the last years qualify as examples of cyber-terrorism. So why has this fear been so persistent? Instead of trying to answer how long cyber-terror is likely to remain a fictional scenario, this paper looks at how cyber-threats in general, and cyber-terror in particular are framed, and speculates on characteristics that are responsible for the rapid and considerable political impact of the widespread conceptualization of aspects of information technology as a security problem in the 1990s.

This document contain a simple example of an expert witness digital forensics report

On September 2013 an attack on the Westgate mall in Kenya led to a four day siege, resulting in 67 fatalities and 175 wounded. During the crisis, Twitter became a crucial channel of communication between the government, emergency... more

On September 2013 an attack on the Westgate mall in Kenya led to a four day siege, resulting in 67 fatalities and 175 wounded. During the crisis, Twitter became a crucial channel of communication between the government, emergency responders and the public, facilitating the emergency management of the event. The objectives of this paper are to present the main activities, use patterns and lessons learned from the use of the social media in the crisis. Using TwitterMate, a system developed to collect, store and analyze tweets, the main hashtags generated by the crowd and specific Twitter accounts of individuals, emergency responders and NGOs, were followed throughout the four day siege. A total of 67,849 tweets were collected and analyzed. Four main categories of hashtags were identified: geographical locations, terror attack, social support and organizations. The abundance of Twitter accounts providing official information made it difficult to synchronize and follow the flow of information. Many organizations posted simultaneously, by their manager and by the organization itself. Creating situational awareness was facilitated by information tweeted by the public. Threat assessment was updated through the information posted on social media. Security breaches led to the relay of sensitive data. At times, misinformation was only corrected after two days. Social media offer an accessible, widely available means for a bi-directional flow of information between the public and the authorities. In the crisis, all emergency responders used and leveraged social media networks for communicating both with the public and among themselves. A standard operating procedure should be developed to enable multiple responders to monitor, synchronize and integrate their social media feeds during emergencies. This will lead to better utilization and optimization of social media resources during crises, providing clear guidelines for communications and a hierarchy for dispersing information to the public and among responding organizations.

It is more than obvious that the way of conducting terrorism with the time is becoming more sophisticated. The cyber terrorism is real threat to fast technology development. Potential targets are systems which control the nation’s... more

It is more than obvious that the way of conducting terrorism with the time is becoming more sophisticated. The cyber terrorism is real threat to fast technology development. Potential targets are systems which control the nation’s defenses and critical infrastructure. The terrorist of the future will win the wars without firing a shot - just by destroying infrastructure that significantly relies on information technology. The fast growth of the Internet users and Internet dependence dramatically increased the security risks, unless there are appropriate security measures to help prevention. To understand cyber terrorism it is important to look at its background, to see how the terrorist organizations or individuals are using the advantage of new technology and what kind of measures governments and international organizations are taking to help the fight against cyber terrorism.

With the increase in the number of internet users in the country (India), led to a new form of crimes known as Cyber Crime. No doubt, the internet revolution has been a boon to mankind in many fields. However, the dark side of it also... more

With the increase in the number of internet users in the country (India), led to a new form of crimes known as Cyber Crime. No doubt, the internet revolution has been a boon to mankind in many fields. However, the dark side of it also gaining ground which can be seen with an increase in the cyber crime cases in the last few years, especially in metropolitan cities. So, this paper tries to analyse the secondary data related to cyber crimes in metropolitan cities in India.
Key Words: Cyber Crime; Metropolitan Cities; Persons Arrested; Conviction; Police Pendency; Court Pendency, etc.

Research and analyze cyber security incidents Background / Scenario

Bu el kitabını CEH içeriğine uygun olarak modüler bir yapıda hazırlamaya çalıştım. El kitabı, daha çok bir saldırı klavuzu olarak nitelendirilebilir. Penetrasyon testi sırasında “hangi işlemleri, hangi sırayla ve nasıl uyguluyoruz?”... more

Bu el kitabını CEH içeriğine uygun olarak modüler bir yapıda hazırlamaya çalıştım. El kitabı, daha çok bir saldırı klavuzu olarak nitelendirilebilir. Penetrasyon testi sırasında “hangi işlemleri, hangi sırayla ve nasıl uyguluyoruz?” sorularını ortadan kaldırmak ve karışıklıkları gidermek adına, adım adım hazırlanmış bir rehber ortaya koymaya çalıştım.
Okunduğunda, rehberde ele alınan başlıklar hakkında sizlere tatmin olabileceğiniz kadar çok şey öğretebilecek bir çalışma olmayacağının altını çizmek istiyorum. Burada iş biraz okuyucuya düşüyor. Bu çalışmada genel hattıyla ele alınan konuları daha detaylı öğrenerek, araştırma yaparak ve azimle çalışarak kendinizi geliştirmek şartıyla bir şeyler öğrenebilirsiniz.