Analysis of Malicious Documents-Part 3

In the last part of the article series, we have seen some handy options of OfficeMalScanner like debug, scan, brute, etc.; learned about structures streams, etc. In this part of the article, we will…

Go on to the site to read the full article

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by LM Security. Read the original post at: