|
Browser attacks now should be said to be a new trend. Rogue software and account theft should belong to this category. Hehe, of course, this is actually a job requirement, so I ca n’t change anything, so I want to explore What can you do after grabbing the package to find some signs of attack? For example, the initial thoughts include reorganizing the HTML file to analyze the scripting language inside it, and the analysis of ActiveX. I don't know if it is feasible. |
|