Malware:ITX8060:2011:LAB4

Allikas: Lambda

Try to understand who ?

Milestone: 11.14.2011 - 00:00

Work in teams to 7 peopel in team pleas register teams before 21:00 13.12.2011

Each team who has more than 3 members should be prepared to present his solution at 14.12.2011

Lets pretend that exploit downloaded Trojan to leak information out of your environment and you need to understand who is behind that.


* construct as non malicious honey document you can to track where from or who used you document.
* describe process how you built it and your idea behind this tracking
* describe needed infrastructure you need to track this document.


Deliverables

* Document
* Description of idea behind document and how you made it.
* Description of infrastructure for document tracing