In some occasions you need to acquire an image of a computer using a boot disk and network connectivity.
Dynamic and static malware analysis using a lot of preconfigured environments.
Every analyst, during day by day experiences refines its own workflow for timeline creation. Today i propose mine.
Do you think that protect your Excel worksheet with password is safe? You are wrong!
Malware authors have always looked for new techniques to stay invisible. This includes being invisible on the compromised machine, but it is even more important to hide malicious indicators and behavior during analysis.
Parsing SetupAPI log for fun and profit!