Hackers of CypherCon
Always Look a Gift (Trojan) Horse In the Mouth with James Arndt (2x14)
: 20, 2019
In this talk, learn various tools and techniques that can be used to thoroughly analyze a malicious email attachment and everything that comes after it. In order to get as many stones as possible, we will want to leave no stone unturned. This information can then be used to look for indicators of compromise throughout your environment.