During an incident, a company's CIRT determines it is necessary to observe the continued network-based transactions between a callback domain and the malware running on an enterprise PC. Which of the following techniques would be BEST to enable this activity while reducing the risk of lateral spread and the risk that the adversary would notice any changes?
steven1
Highly Voted 4 years, 9 months agoHanzero
Highly Voted 4 years, 9 months agoKelvinYau
Most Recent 7 months, 3 weeks agolove310bus
1 year, 12 months agoabd1234
3 years agofonka
3 years, 11 months agoStaceycrank
4 years, 4 months agohlwo
4 years, 8 months agoCrystalClear
4 years, 5 months agoTeza
4 years, 10 months ago