technique
https://www.corero.com/resources/ddos-attack-types/syn-flood-ack.html
Corero. (n.d.). What is a SYN-ACK Flood Attack?. Retrieved April 22, 2019.
technique
https://capec.mitre.org/data/definitions/469.html
technique
https://capec.mitre.org/data/definitions/482.html
technique
https://attack.mitre.org/techniques/T1499/001
technique
http://www.blackhat.com/docs/asia-14/materials/Tsai/WP-Asia-14-Tsai-You-Cant-See-Me-A-Mac-OS-X-Rootk
Pan, M., Tsai, S. (2014). You can’t see me: A Mac OS X Rootkit uses the tricks you haven't known yet. Retrieved December 21, 2017.
technique
https://www.crowdstrike.com/blog/http-iframe-injecting-linux-rootkit/
Kurtz, G. (2012, November 19). HTTP iframe Injecting Linux Rootkit. Retrieved December 21, 2017.
technique
https://www.symantec.com/avcenter/reference/windows.rootkit.overview.pdf
Symantec. (n.d.). Windows Rootkit Overview. Retrieved December 21, 2017.
technique
https://en.wikipedia.org/wiki/Rootkit
Wikipedia. (2016, June 1). Rootkit. Retrieved June 2, 2016.
technique
https://capec.mitre.org/data/definitions/552.html
technique
https://attack.mitre.org/techniques/T1014