Hey all – I’m working on getting cuckoo up and running so I can start analyzing malicious attachments sent through email. More practice for me than anything else.
Just wondering if anyone else does this in a different way or has a different process. I’m the sole cyber guy so I don’t really have anyone to show me “best practices”
Also – how am I supposed to get these files into cuckoo? I supposed I could download them and use a usb to get it over to my cuckoo machine, but I’d rather not download malicious files to my PC