Network Forensics Tools
After reviewing the video below, discuss your observations/lessons learned, and what other steps could be taken, from a network forensics perspective, to analyze malware with similar TTPs as the Zyklon Trojan.
PLEASE WATCH VIDEO BEFORE ANSWERING QUESTION