Imagine a customer sent to you an executable he received as attachment to an email. Imagine he asked you to analyze it... Starting from this file, try to reconstruct the whole attack scenario that your client suffered.
Use the tools you studied during the course to analyze (dynamically andor statically) malicious files and malware.
Participants should be able to demonstrate their ability with all the tools they studied during the course.
- TIME480 MINUTES
- COST10 CRYSTALS