CodeExplorer Posted May 22, 2009 Share Posted May 22, 2009 Link:http://www.kishorethakur.com/2008/12/advan...-forensics.htmlHere are a few quick steps for performing malware analysis on various badware (viruses, works, trojans, rootkits) that you may find in the course of a computer forensics investigation. In this case, I'm analyzing a variant of Sohanad, a Instant Messaging Worm, also known as "the cool pics worm". Link to comment Share on other sites More sharing options...
aztecx Posted May 23, 2009 Share Posted May 23, 2009 Nice read man I like the list of tools at the start and the explanation of what they all do. Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now