Now that we have the file in question located, we can begin to gather information about the file that the FIM agent didn't provide us with. This next phase in our methodology will set us up for success in the later phases, so we want to make sure our efforts are as thorough as possible. It is also important that whatever information we gather about the binary is as organized and easy for us to read through as possible. As we work through this recipe, we will keep all of these requirements in mind.
Depending on the binary we're analyzing, the information gathering phase of our methodology may be quite the undertaking to make sure we fulfill the thoroughness requirement. However, with that said, just like with penetration testing, it's important we spend a significant amount of time on this phase of our methodology because it will determine how...