References

Type
Url
Description

technique

https://www.corero.com/resources/ddos-attack-types/syn-flood-ack.html

Corero. (n.d.). What is a SYN-ACK Flood Attack?. Retrieved April 22, 2019.


technique

https://capec.mitre.org/data/definitions/469.html


technique

https://capec.mitre.org/data/definitions/482.html


technique

https://attack.mitre.org/techniques/T1499/001


technique

http://www.blackhat.com/docs/asia-14/materials/Tsai/WP-Asia-14-Tsai-You-Cant-See-Me-A-Mac-OS-X-Rootk

Pan, M., Tsai, S. (2014). You can’t see me: A Mac OS X Rootkit uses the tricks you haven't known yet. Retrieved December 21, 2017.


technique

https://www.crowdstrike.com/blog/http-iframe-injecting-linux-rootkit/

Kurtz, G. (2012, November 19). HTTP iframe Injecting Linux Rootkit. Retrieved December 21, 2017.


technique

https://www.symantec.com/avcenter/reference/windows.rootkit.overview.pdf

Symantec. (n.d.). Windows Rootkit Overview. Retrieved December 21, 2017.


technique

https://en.wikipedia.org/wiki/Rootkit

Wikipedia. (2016, June 1). Rootkit. Retrieved June 2, 2016.


technique

https://capec.mitre.org/data/definitions/552.html


technique

https://attack.mitre.org/techniques/T1014