CodeExplorer Posted May 22, 2009 Posted May 22, 2009 Link:http://www.kishorethakur.com/2008/12/advan...-forensics.htmlHere are a few quick steps for performing malware analysis on various badware (viruses, works, trojans, rootkits) that you may find in the course of a computer forensics investigation. In this case, I'm analyzing a variant of Sohanad, a Instant Messaging Worm, also known as "the cool pics worm".
aztecx Posted May 23, 2009 Posted May 23, 2009 Nice read man I like the list of tools at the start and the explanation of what they all do.
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now