My question is, how to investigate a hacker.
I'll be honest, I'm a newbie in hacking and ethical security, trying to learn some stuff about Kali Linux.
Anyway, I learned till now, that if you use metasploit to hack, you need to make a payload and send it to the victim.
So I made some thoughts about how to investigate a hacker.
Let's say someone sent me a payload and wants to hack my device, what should I do to catch him ?
I think the possible way is to encode the payload somehow, because if someone makes a payload, he/she needs to set the LHOST = his/her IP address. But the thing is, I don't know how to encode it. I tried to open it with leafpad, but.... nothing was there to understand.
So yeah, can somebody help me with this ? and also, if this is not the right way to catch a hacker, how could I do it then ?