nuclearwind Sep 24 2019 at 23:49Digital Forensics Tips&Tricks: Telegram IM-based RAT — Part IReading time3 minViews2.5KInformation Security*Total votes 6: ↑6 and ↓0+6Add to bookmarks3Comments2
nuclearwind Sep 25 2019 at 10:13Show previous commentYes, you can do something useful, of course. Buhtrap cyberteam were using a Teamviewer and PuntoSwitcher for their RAT. Does it mean that you do not need to know how to search and find these modules during the investigation?
Digital Forensics Tips&Tricks: Telegram IM-based RAT — Part I