Posted on
in Presentations
How can the nature and capabilities of a suspicious file be determined? Incident responders, SOC analysts, and other practitioners can use a variety of free Linux tools for malware analysis, even if the malware aims to infect a Windows system. This practical session will show attendees how to get started with malware analysis using a variety of Linux tools, using the free REMnux toolkit for the examples.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community