6.1. Identify the Threat and Attack Vectors |
6.1.5. Upload to Anubis.iseclab.org |
![]() | 6.1.5.1. Does the executable modify critical files? |
![]() | 6.1.5.2. Does the executable modify common load points in the |
![]() | 6.1.5.3. Does the executable open communications to the internet? and |