Sign in with
Sign up | Sign in
Your question
Closed

Cyber Command Completes First Major Attack Simulation

Last response: in News comments
Share
December 5, 2011 9:17:41 PM

As if they would say it if the simulations would fail.....
Score
22
December 5, 2011 9:42:11 PM

My IP is 127.0.0.1 go at it :) 
Score
26
December 5, 2011 9:50:26 PM

For added network security, update your WinRAR and delete System32.
Score
-9
December 5, 2011 9:53:06 PM

FloKidMy IP is 127.0.0.1 go at it


I'd laugh my ass off if someone there tried it, lo good one.
Score
15
December 5, 2011 9:55:59 PM

"We didn't expect someone to set the building on fire"
Score
12
December 5, 2011 10:00:26 PM

FloKidMy IP is 127.0.0.1 go at it


Wow there was some crazy pictures on your machine!
Score
15
December 5, 2011 10:02:32 PM

xX_PEMDAS_XxWow there was some crazy pictures on your machine!


Oh wait, no wonder my credit card charges went through the roof..
Score
8
December 5, 2011 10:11:58 PM

Easiest solution, if you detect multiple attacks in real time, take the servers off of the WAN, most real-time attacks cant be stopped in real time while keeping normal operation.

Also unlike with a simulation where you know what is happening because things are set up. In real life, you generally wont know when the network has been compromised. (many of the best security firms have been hacked, and malicious users having full or nearly full access for months or years).

If you are attacking a remote server, if your goal is not denial of service, then the moment your attack has been detected, it has failed (unless you already know their complete network map as well as all of the exploitable software running ahead of time and only need to quickly get a single small file)
Score
2
December 5, 2011 10:22:59 PM

Did the 150 attackers attack from 150 off site computers or did they attack from 150 PCs controlling 150 different botnets with a couple hundred (or thousand+) computers in each botnet? (Can't really be answered here but I don't think China/Russia/Our current allies are going to be attacking with anything less than a half a million computers willing or unwilling computers.)

Cyber War I, Uncle Sam needs you to join the attack! Install SamNet on all of your connected devices Today!!!
Score
0
Anonymous
December 5, 2011 10:37:28 PM

Skynet is going to become SelfAware.
Score
-1
December 5, 2011 11:39:03 PM

*yawn*
This is like the pitcher and the umpire are father and son....
Score
-1
December 6, 2011 12:12:32 AM

I bet when the colonel's away those guys threw an epic battlefield 3 lan party....
Score
14
December 6, 2011 12:36:49 AM

Igot1forya"We didn't expect someone to set the building on fire"

rofl, thats how you do it kobayashi maru style.
Score
2
December 6, 2011 1:09:20 AM

Ok I realize people are just guessing, but having been through a red team visit before, these guys don't play nice. They will find a way in, even if they have to create fake security badges and hack from the inside. And when their finished they create this nice report detailing what they did and how they did it and present it to your commander.

It's a good experience, albeit extremely stressful.
Score
-1
December 6, 2011 1:35:08 AM

The little problem with this simulation is that the "attackers" use the schemes of attack known to US Cyber Command and which they suppose will be used. But the question is - will the Chinese hackers use the same schemes? :) 
Score
0
December 6, 2011 10:09:02 AM

Seems like a good start.
Score
1
December 6, 2011 11:14:24 AM

It's a good start to wasting Millions of taxpayers dollars on a Chinese style firewall for the whole country. Doesn't it strike anyone of the uses of this thing? if it works that is.
I wonder why everyone is so paranoid and live in fear all the time?
Who the hell would want to take their Military secrets? Wiki already has them all.
And why would any idiot want to attack the US , die hard style? it was simple enough with the planes..., the banks, and the oil why it'd be pretty simple to coax the president itself again with a multi billion dollar election campaign package.
Really, and the best part of it is, all the strategic networks ought to be off the internet, just simple LANs and WANs. Reduce stupid spending and provide better housing and employment to your citizens would be a better option.
Security..... that's a laugh.
Spending on it..... is like Halliburton contracts.
And then testing them..... is like 911, fooling the people to believe what is and what is not, when they are all aware of what is the actual state of the states affairs, and I don't mean the Monica Lewinsky affairs.
Score
0
December 6, 2011 11:19:37 AM

"Col. Rivers J. Johnson of the command's public affairs office told InformationWeek that while the Cyber Command was not 100 percent successful in fending off all of the attacks, the majority of threats were identified and deflected "in a timely manner."

"There were a variety of scenarios based on what we think an adversary would do in real world events and real world time," he's quoted as saying. "It was a great exercise." "


The Col. still uses the Win 3.1 Word Processor for all his PR reporting.
"Majority in a timely manner"..... was that the time before the got into the systems or were getting out of the systems? or was it after they came, they and they..... you royally.
There can't be real world events in the cyber world..... dumbass. this is not a virtual reality war game.
"It was a great exercise" only if you learnt what a waste of time it was.
Score
-2
December 6, 2011 2:13:52 PM

My secound cousin works for the Dep of defence ( contractor ), The "bad guys" always get in.. even if it means breaking in physical to turn on the computers to hack them. Because the best defense is no connection to the internet. They run different operating systems and different programs, on different networks for every task. So if one system goes down they can still operate with everything else.
Score
0
December 8, 2011 10:01:07 AM

TheCapuletIt's likely the "attacking" team kept some secrets up their sleeves, as well as creating new and inventive ways to find and take advantage of current vulnerabilities. In a scenario like this, there's just as much 'kudos' to be won on the attacking side as the defending side. If you have 300 security officers all competing for the attention of their CO, trying to look good for the next eval and hopeful rank, you can bet your ass that they were trying as hard as they could.


But if you have 300 dumb people /I don't imply the Cyber Command are dumb, this is just an example/ and divide them in two groups, these two groups will also be of the same dumb people. Point is - being a part of the same group makes them predictable, competing with each other or not, they will work in the same known to all the group frame.
Score
0
!