Hi all,
At one of my client engagements they provided us with about 24 web-based opensource tools to work with to research malicious activity.
For you experienced guys is their anywhere to find a logical sequence of steps to use in systematically engaging these listed tools to research malicious activity as opposed to just using every single tool and checking things off in a checklist? For instance I meant something like the below example scenario :
To check if a site is malicious
1. Engage tool #1 and key in IP address, If no answer found, then engage tool #A.
2. Take info from tool #A and key into this other tool #2 to obtain better details.
3. Take info from tool #2 and key into tool #3 to obtain the user email address.
Thanks in advance for any help, suggestions, etc.