Cyber Sun Tzu (@suntzusec) 's Twitter Profile
Cyber Sun Tzu

@suntzusec

The original cyber general. Behold the words of wisdom direct from The ARP of War, the classic military cyberwarfare text by Sun Tzu Security.

ID: 809941846642323456

calendar_today17-12-2016 02:02:39

75 Tweet

6,6K Takipçi

2 Takip Edilen

Cyber Sun Tzu (@suntzusec) 's Twitter Profile Photo

The truest scrublord layers their OpSec mistakes, and baffles the enemy with their implausible incompetence. motherboard.vice.com/en_us/article/…

Cyber Sun Tzu (@suntzusec) 's Twitter Profile Photo

When defeated in cyber battle, the FireEye generals will often blame advanced state-sponsored hackers, even if the true breach was caused by weak passwords and gullible soldiers.

Cyber Sun Tzu (@suntzusec) 's Twitter Profile Photo

Thank you for 7500 followers. In return I offer you this unique wisdom from one of my recent battles: the wisest cyber master waits patiently for their enemy to enter a state of weakened encryption. It may take weeks or even months, but when the moment comes, hack them swiftly.

Cyber Sun Tzu (@suntzusec) 's Twitter Profile Photo

The greatest victory is that which requires no Google. The peak efficiency of knowledge and strategy is to make emails unnecessary.

Cyber Sun Tzu (@suntzusec) 's Twitter Profile Photo

Rouse the Donald, and learn the principle of his cyber activity or inactivity. Force him to reveal himself, so as to execute a coordinated permanent ban on his infrastructure.

Cyber Sun Tzu (@suntzusec) 's Twitter Profile Photo

An effective troll always seeks to mine fresh salt. However, you cannot assume your decades-old techniques will rouse the modern enemy. You must arrive at the potential salt mine with nothing but your wits and build your extractor machines based on what you uniquely observe.

Cyber Sun Tzu (@suntzusec) 's Twitter Profile Photo

Pretend technical incompetence and encourage enemy ransomware with a well-equipped honeypot. Then, STRIKE! Seize their infrastructure, their funds, and their freedoms.

Cyber Sun Tzu (@suntzusec) 's Twitter Profile Photo

TCP packets advance like the wind; they invade and plunder like fire; they stand like the mountain; they are formless like the dark.

Cyber Sun Tzu (@suntzusec) 's Twitter Profile Photo

When hacking, seek a quick victory. A long battle will diminish your exploits, decrease your operational security, and blunt your keyboard.

Cyber Sun Tzu (@suntzusec) 's Twitter Profile Photo

To build protective shields, armored wagons, and make ready other cyber defenses, you will require at least one small anti-ransomware patch.

Cyber Sun Tzu (@suntzusec) 's Twitter Profile Photo

The Converse of victory are like a drawn crossbow and their first steps are the release of the ultimate freedom. x.com/xychelsea/stat…

Cyber Sun Tzu (@suntzusec) 's Twitter Profile Photo

To know your enemy is to become your enemy, therefore capturing an entire botnet is better than destroying it. Opportunities multiply as they are seized.

Cyber Sun Tzu (@suntzusec) 's Twitter Profile Photo

The clever cyber generals ensure their payloads exist without ascertainable shape. They exist only in RAM. Then the most penetrating spies cannot pry in nor can the wisest hackers lay counterattacks against you.

Cyber Sun Tzu (@suntzusec) 's Twitter Profile Photo

All cyber warfare is based on deception. Update your privacy policy at the last possible moment. Victory usually goes to the army with the most obscure data protection clauses.