![]() ![]() Finally, you will reveal different activities done and recover different artefacts left behind by the malware to unveil its intention by analysing the captured network traffic dump, the acquired memory image and the given instance of malware. Then, you will need to capture the network traffic to and from the infected lab PC for the duration of a full execution of the malware, and then to acquire a memory image from the PC after the full execution of the malware for analysis. To conduct a comprehensive investigation, you will fully execute the ransomware. You will need to apply the knowledge and skills you have learned from this module. ![]() You should aim to demonstrate your mastery of the subject. In this coursework assignment, you are asked to conduct a forensics investigation of ransomware and to produce a fair and unbiased report on the findings. ![]()
0 Comments
Leave a Reply. |