Home Tips & Tricks Tracking threat actors through .LNK files

Tracking threat actors through .LNK files

0
0
2,425

In this blog post guys from NVISO Labs answer Harlan Carvey’s question: “Did you parse the LNK file for things such as embedded MAC address, NetBIOS system name, any SID, and volume serial number?”, – he asked under their previous post.

Load More Related Articles
Load More In Tips & Tricks
Comments are closed.