In an Information Security setting, attribution seeks to determine the identity of perpetrators of cyber operations or events.
Links to this note
- attribution by cryptographic key
- Main Index
- activecountermeasures-strand2013
- linenoise-phrack71-2024
- trackingteamtnt-fiser2021
- unveiling wolfsbane-sperka2024
- hackingteamwriteup-fisher2016
- skuld-taniumcti2023
- borges2021
- falseflags-kaspersky2017
- yara as a tool for attribution
- baines2016
- Program Database
- .debug_info section used for attribution
- Advanced Persistent Threat
- attackers gaining shells
- attribution by algoritm usage
- attribution by language usage
- attribution by password characteristics
- attribution by password reuse
- attribution by tool use
- code reuse as attribution
- exploits and 0-day as attribution
- false attribution
- keys and passwords as attribution
- Main Index - A
- strings as attribution
- typos in malware