Introduction
What?
Identifying and analysing malicious payloads of various formats embedded in PDFs, EXEs and Microsoft Office Macros.
Identifying obfuscated code and packed files, and analysing these.
Analysing the memory dump of a PC that became infected with the Jigsaw ransomware in the real-world using Volatility.
Why?
Practice with real-world example cases.