This article is from The Unhackable Cloud edition, that you can download for free if you have an account on our website. Analysis of Malicious Excel Spreadsheet Malicious Office documents are often used in targeted attacks against individuals or organizations. Attackers embed malicious code into documents, Excel spreadsheets or Adobe Acrobat PDF files. This article....
Author
Latest Articles
- BlogSeptember 29, 2020Using the Google custom search engine for OSINT | By Maciej Makowski
- BlogSeptember 22, 2020Sysmon 12.0 — EventID 24 | By Olaf Hartong
- BlogSeptember 21, 2020Decrypting Databases Using RAM Dump – Health Data | By Michal Rozin
- BlogSeptember 18, 2020TikTok — Using OSINT to Discover New Leads | By Josh Richards
Yes, you can write separate (Python) programs to compute partial results, but you can also edit the original malware to print the partial results and halt. This approach is a bit faster and just as safe if you take care never to let the malware run to completion in a non-sandbox environment.