Daniel Roberson
  • Posts
  • About
  • Notes
  • Projects
  • Time
  • Posts
    About
    Notes
    Projects
    Time

attribution

0001-01-01

In an Information Security setting, attribution seeks to determine the identity of perpetrators of cyber operations or events.


Links to this note

  • attribution-steffens2020
  • anti-forensics categories
  • behavioral evasion
  • hacking harness
  • infrastructure hygiene
  • attribution by cryptographic key
  • Main Index
  • activecountermeasures-strand2013
  • linenoise-phrack71-2024
  • trackingteamtnt-fiser2021
  • attribution by password characteristics
  • unveiling wolfsbane-sperka2024
  • hackingteamwriteup-fisher2016
  • skuld-taniumcti2023
  • borges2021
  • falseflags-kaspersky2017
  • yara as a tool for attribution
  • baines2016
  • Program Database
  • .debug_info section used for attribution
  • Advanced Persistent Threat
  • attackers gaining shells
  • attribution by algoritm usage
  • attribution by language usage
  • attribution by password reuse
  • attribution by tool use
  • code reuse as attribution
  • exploits and 0-day as attribution
  • false attribution
  • keys and passwords as attribution
  • Main Index - A
  • strings as attribution
  • typos in malware

Recent Posts

Linux Persistence: Modular Software

2025-04-17 DFIR CTF persistence linux persistence apache asterisk

Linux Persistence: Web Shells

2025-04-16 DFIR persistence webshell linux persistence webshell apache nginx PHP

Linux Persistence: Rootkits

2025-04-15 DFIR persistence rootkit LKM linux persistence LKM rootkit LD_PRELOAD kprobe ftrace ld.so hooking

Linux Persistence: Processes

2025-04-11 DFIR persistence processes linux persistence processes

Defanging Linux LKM Rootkits With cleanup_module()

2025-04-05 Linux LKM rootkits EDR hooks incident response Linux LKM rootkit


Home

About

Notes

Projects

Time

© All rights reserved. Powered by Hugo and Erblog.