User Tools

Site Tools

tactics:flank

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
tactics:flank [2024/09/28 10:38] – [Metaphorical & Digital Flanking] Humphrey Boa-Garttactics:flank [2024/09/28 19:47] (current) Humphrey Boa-Gart
Line 6: Line 6:
 ===== Flanking in Traditional Warfare ===== ===== Flanking in Traditional Warfare =====
  
-Flankingas we understand it, is a very broad military tactic which has been used in warfare for millenia. Knowing how flanking can be performed on all three [[tactics:levels-of-war|Levels of Warfare]] will give you a better idea of how to make use of the concept on digital battlefields and during [[:op|Anonymous Operations]].+Flanking as we understand it, is a very broad military tactic which has been used in warfare for millenia. Knowing how flanking can be performed on all three [[tactics:levels-of-war|Levels of Warfare]] will give you a better idea of how to make use of the concept on digital battlefields and during [[:op|Anonymous Operations]].
  
  
Line 35: Line 35:
 ===== Metaphorical & Digital Flanking ===== ===== Metaphorical & Digital Flanking =====
  
-Flanking an enemy on today's modern asymmetric and digital battlefields is not too different from flanking in the days of old. The concept is very much the same: Find a weak spot around the primary line of defense.+Flanking an enemy on today's modern asymmetric and digital battlefields is not too different from flanking in the days of old. The concept is very much the same: Find a weak spot around the primary line of defense, and concentrate your firepower on that spot.
  
 **For example:** Is your enemy using Cloudflare to resist head-on [[tactics:ddos|DDOS]] attacks on their website, while their web server has detection software that prevents [[tactics:brute-force|brute forcing]] your way in? Then maybe you should consider using a bit of [[diy:social-engineering|social engineering]] to get unrestricted staff access through a side entrance, where those systems have no defensive value. **For example:** Is your enemy using Cloudflare to resist head-on [[tactics:ddos|DDOS]] attacks on their website, while their web server has detection software that prevents [[tactics:brute-force|brute forcing]] your way in? Then maybe you should consider using a bit of [[diy:social-engineering|social engineering]] to get unrestricted staff access through a side entrance, where those systems have no defensive value.
  
-As long as you can think outside the box, there is a vulnerable flank to even the most towering of enemies.+As long as you can think outside the box, there is a vulnerable flank to even the most daunting of enemy forces.
  
  
  
 {{tag>Tactics}} {{tag>Tactics}}
tactics/flank.1727519908.txt.gz · Last modified: 2024/09/28 10:38 by Humphrey Boa-Gart

Find this page online at: https://bestpoint.institute/tactics/flank