Media Summary: In this workshop (2 hours), I explain how to use the tools (oledump, emldump, YARA rules, β¦) I developed to Can you trust your 3rd party software? We can help you. Fill out this form β One of the key features in VMRay Analyzer 2.0 is the built-in reputation engine that identifies known
Analyzing Malicious Office Documents Presented - Detailed Analysis & Overview
In this workshop (2 hours), I explain how to use the tools (oledump, emldump, YARA rules, β¦) I developed to Can you trust your 3rd party software? We can help you. Fill out this form β One of the key features in VMRay Analyzer 2.0 is the built-in reputation engine that identifies known In case you didn't have time for our 2-minutes introduction to the topic ( :) More information at:Β ... Ring Γ Labs: How do you get started in # REcon 2008 Hacking conference , , , , , .