January 15, 2021

How do *you* analyze malicious files?

Hey all – I’m working on getting cuckoo up and running so I can start analyzing malicious attachments sent through email. More practice for me than anything else.

Just wondering if anyone else does this in a different way or has a different process. I’m the sole cyber guy so I don’t really have anyone to show me “best practices”

Also – how am I supposed to get these files into cuckoo? I supposed I could download them and use a usb to get it over to my cuckoo machine, but I’d rather not download malicious files to my PC



Can’t you give Cuckoo a URL?

Leave a Reply

Your email address will not be published. Required fields are marked *

Note: By filling this form and submitting your commen, you acknowledge, agree and comply with our terms of service. In addition you acknowledge that you are willingly sharing your email address with AiOWikis and you might receive notification emails from AiOWikis for comment notifications. AiOWiksi guarantees that your email address WILL NOT be used for advertisement or email marketting purposes.

This site uses Akismet to reduce spam. Learn how your comment data is processed.