Topic Requirements: Try analysis of this document,
It seems that everyone has emphasized the attack and the analysis process and documentation.
The ultimate use method is only the product of a large number of analytical processes. The key is that you get one
How do you lose him after unknown files, analyze him; every analysis angle you got
What information, this information is affecting your next analysis;
You have been able to use the key information available, and you will encounter the use of methods.
What difficulties are there, how to solve it, it's hard to overcome..
In the end, you can evaluate whether your analysis angle is comprehensive and useful.
Whether the tool used is best, whether the foundation is fully solid, etc. ~~
The document is best used in DOC / PDF / TEX format. The document should have a good structure and expressed clearly.
BY
Watercloud