A cyber attacker is suspected of using program packers as an anti forensics technique in a major data breach incident. As the lead cybersecurity investigator, you’ve been tasked to deal with the situation. Which of the following actions would be most effective in defeating this anti-forensic technique?
Submit