How can the nature and capabilities of a suspicious file be determined? Incident responders, SOC analysts, and other practitioners can use a variety of free Linux tools for malware analysis, even if the malware aims to infect a Windows system. This practical session will show attendees how to get started with malware analysis using a variety of Linux tools, using the free REMnux toolkit for the examples.
Analytics, Intelligence & Response Open Source Tools
anti-malware forensics & e-discovery incident response anti-malware threat intelligence
Share With Your Community