On a recent engagement, I took a different approach to finding possible
malicious files entering the customer's network. Rather than focusing on
the e-mail, I looked for any RAR, macro-enabled office documents, and
portable executable files (PE) ente...