Summary
In this chapter, we slipped a little into the dark side of cybersecurity but at the same time, we learned how it is necessary to understand how the bad actors do what they do. Police will often say, “If you want to learn how to catch a criminal then, you need to learn how to think like a criminal.” The same is true in the field of cybersecurity. If you want to learn how to catch a hacker, then you need to learn how to think like a hacker. That makes sense, right? We started down that path of cybersecurity when we took some time to begin learning how to use the same tools and develop the same skills the bad actors do. Now, we can use these resources to train the people in our respective organizations and then we can create mock campaigns to test them!
We immediately examined five deep analysis tools that dealt with examining Microsoft Windows executables, file and file system analyzation, disassembly and reverse engineering, grabbing and analyzing volatile memory...