CTRL, Search, Exploit,
and Destroy
Maurice E. Dawson, Ph.D., D.C.Sc., SMIEEE
Assistant Professor
Director, Center for Cyber Security and Forensics Education
Illinois Institute of Technology | School of Applied
Technology
Session Overview
2
An ever-evolving technological landscape also
means a rapidly changing digital battlefield. The
integration of intelligence, psychological operations,
information warfare, data science, and
cybersecurity has allowed for unparalleled events
to be possible. This session is to explore the
landscape and sample some of the applications to
perform this exploration.
3
CTRL
CTRL
First, an individual must gain
control of the situation. This
enables an individual to
appropriately plan out,
strategize, and then execute
the attack.
4
5
SEARCH
Search
Intelligence Gathering
Open Source Intelligence
Human Intelligence
Measurement Intelligence
Geospatial Intelligence
Signals Intelligence
Technology Info Gathering
OWASP Top 10
Photo Metadata
Technology & Device Manuals
Network Mapping
Source Code Analysis
Software Vulnerabilities
Hardware Vulnerabilities
6
7
8
9
10
Search for php errors that can
allow for SQL injection. This
can range from inappropriate
pass through of a variable to a
badly chosen variable.
11
12
13
Exploit
14
EXPLOIT
15
16
17
18
DESTROY
19
20
21
22

CTRL, Search, Exploit, and Destroy

  • 1.
    CTRL, Search, Exploit, andDestroy Maurice E. Dawson, Ph.D., D.C.Sc., SMIEEE Assistant Professor Director, Center for Cyber Security and Forensics Education Illinois Institute of Technology | School of Applied Technology
  • 2.
    Session Overview 2 An ever-evolvingtechnological landscape also means a rapidly changing digital battlefield. The integration of intelligence, psychological operations, information warfare, data science, and cybersecurity has allowed for unparalleled events to be possible. This session is to explore the landscape and sample some of the applications to perform this exploration.
  • 3.
  • 4.
    CTRL First, an individualmust gain control of the situation. This enables an individual to appropriately plan out, strategize, and then execute the attack. 4
  • 5.
  • 6.
    Search Intelligence Gathering Open SourceIntelligence Human Intelligence Measurement Intelligence Geospatial Intelligence Signals Intelligence Technology Info Gathering OWASP Top 10 Photo Metadata Technology & Device Manuals Network Mapping Source Code Analysis Software Vulnerabilities Hardware Vulnerabilities 6
  • 7.
  • 8.
  • 9.
  • 10.
    10 Search for phperrors that can allow for SQL injection. This can range from inappropriate pass through of a variable to a badly chosen variable.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.