Skip to main content

System Setup

  • Chapter
  • First Online:
  • 1894 Accesses

Abstract

Cyber operations is about the configuration, defense, and attack of real systems. Publicly known vulnerabilities in deployed systems are patched, though perhaps not as rapidly as the security might hope. Any publicly known vulnerabilities that might be exploited in currently deployed systems are necessarily 0-days. In contrast, older systems can be attacked using a range of exploits that are known today, but were unknown when the systems were deployed. Thus, this book focuses on systems that were deployed between 2008 and 2013.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Systems kept in their initial state without any security patches are quite insecure; they should not be exposed on the Internet.

  2. 2.

    The precise version of VMWare Tools may vary with the version of VMWare.

  3. 3.

    The precise version may depend on the version of VirtualBox.

  4. 4.

    Registration is required to download.

  5. 5.

    Mark Russinovich, “The Machine SID Duplication Myth,” Mark Russinovich's Blog: Microsoft TechNet., November 3, 2009. http://blogs.technet.com/b/markrussinovich/archive/2009/11/03/3291024.aspx .

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Mike O'Leary

About this chapter

Cite this chapter

O’Leary, M. (2015). System Setup. In: Cyber Operations. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-0457-3_1

Download citation

Publish with us

Policies and ethics