By Tony Lee. When investigating network security incidents, there are two artifacts of malicious activity that require a great deal of research: Suspicious sites and suspicious files. Obviously, the investigator should never directly navigate to potentially malicious sites or open suspicious files--just in case they turn out to be malicious. Thus, one potential solution is to use third party inves
![Deobfuscating Potentially Malicious URLs - Part 1](https://cdn-ak-scissors.b.st-hatena.com/image/square/c957c4c67251368982dc0b8030a6c9cee35b5979/height=288;version=1;width=512/http%3A%2F%2F1.bp.blogspot.com%2F-eFbapFpQ_7Y%2FUPWAR0H2W8I%2FAAAAAAAABbc%2FcxRoKWCazm4%2Fw1200-h630-p-k-no-nu%2F1.png)