Surveillance of the Internet Backbone

Vice has an article about how data brokers sell access to the Internet backbone. This is netflow data. It’s useful for cybersecurity forensics, but can also be used for things like tracing VPN activity.

At a high level, netflow data creates a picture of traffic flow and volume across a network. It can show which server communicated with another, information that may ordinarily only be available to the server owner or the ISP carrying the traffic. Crucially, this data can be used for, among other things, tracking traffic through virtual private networks, which are used to mask where someone is connecting to a server from, and by extension, their approximate physical location…

Continue reading Surveillance of the Internet Backbone

Identifying the method which an attacker used to harvest important account credentials, while the security logs are deleted

Is there a way to spot the method which an attacker used to do all of the necessary credential dumping, or stealing/forging tickets/using pass-the-hash/ticket techniques, if we don’t have access to the DC security log files, but only from … Continue reading Identifying the method which an attacker used to harvest important account credentials, while the security logs are deleted

Can voice analysis be used to determine if voice samples converted in two different ways are from the same person?

Suppose we have two voice samples, A and B, which are converted from the same person’s voice into different voices respectively by a voice changer. In addition, let us assume that the voice conversion causes severe loss of the original voi… Continue reading Can voice analysis be used to determine if voice samples converted in two different ways are from the same person?