YoVDO

Abusing RTF - Exploitation, Evasion, and Exfiltration

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Fuzzing Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced techniques for exploiting, evading detection, and exfiltrating data using RTF (Rich Text Format) in this 31-minute conference talk from Derbycon 2016. Dive into key points for both blue and red teams, examining RTF features, file extension tampering, magic files, and various evasion methods. Learn about real-world examples, bin substitution, control words, and fuzzing techniques using tools like Peach. Discover how to forge images, exploit vulnerabilities, and understand the exploit tree. Gain insights into countermeasures and potential failures, equipping yourself with valuable knowledge for both offensive and defensive cybersecurity strategies.

Syllabus

Introduction
Blue Team Key Points
Red Team Key Points
RTF Features
Why Care
File Extension Tampering
Magic Files
Mixed Case
Evasions
In the wild
What does this mean
Bin substitution
Control words
More examples
How to fuzz
Peach
Demo
Food for thought
Forge Images
Exploitation
Exploit Tree
countermeasures
other failures


Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network