Community:
I am looking for a Journal pub (IEEE Security & Privacy, etc.) that discusses nefariously chaining computers together to share an IP address in an effort to misdirect or hide forensic artifacts. This can be through the use of direct connections like Ethernet-to-USB, or through configuring a computer as a Wireless Access Point (Windows 10 Internet Connection Sharing); as opposed to using a Remote Access Trojan or some other remote control system.
Thank you!
Sincerely,
Eric B.
https://ieeexplore.ieee.org/document/6579417
Didn't read them, but they look promising for your topic.
Michael,
@mgorman wrote:https://ieeexplore.ieee.org/document/6579417
Didn't read them, but they look promising for your topic.
Thank you! These two resources are on the right track. They're discussing the use of proxy servers to obfuscate a remote identity. I'm looking more for resources discussing using a compromised computer as a hop point or proxy pivot point in attack.
Happy new year!
Sincerely,
Eric B.