Threat Intelligence Example

Table of Contents

1. Lecture 04

2. Scenario

Even from the Day 1 some important information are available, the email address of the sender, and the PDF file.

Further information that can be extracted from the proxy log connections originating from Bob’s PC. The mail header can also be used to gather extra information.

Author: Andrea Ercolino

Created: 2022-12-12 lun 12:09