Author: Samuel Liles

Dungeons and Data Centers

Dungeon Master: You are standing in a brilliant lit server roomed filled with millions of dollars in sunk legacy server costs. You: Roll the dice and advance. Dungeon Master: A DevOps ghoul jumps out from behind an IBM 360 running…

Presentations, posts, categories

Presentations (PDF) Teaching Presentation Research Presentation   Blog Posts Considerations of defense in depth Attribution of cyber adversaries Research Note: Defining attacker knowledge, skill, and ability   Blog Categories Digital Forensics Incident Response Threat Intelligence Student Work    

Today’s Attack IPs

For those that are interested. The following list of IP addresses were attempting to brute force log in against the Selil blog. If you own the addresses below. Before you contact me. Make sure your stuff is clean. Anybody out…

Attribution of cyber adversaries

Key Points: Attribution has three distinct layers; political, technical, and forensic with each having different confidence levels and analysis strategies Adversaries must interact with systems to exploit them and this creates evidence or anomalies that can be used for attribution…