YoVDO

Bypassing Endpoint Controls Using Office Macros - Techniques and Defenses

Offered By: SecurityFWD via YouTube

Tags

Cybersecurity Courses Malware Courses Endpoint Security Courses Command and Control Courses Data Exfiltration Courses Remote Code Execution Courses

Course Description

Overview

Explore the intricacies of bypassing endpoint controls using Office macros in this 48-minute video featuring Kilian from Varonis. Dive into the creation of a "malicious" document that evades security measures, establishes command and control channels, and executes remote code. Learn about Excel macro documents, attack surface reduction techniques, and sneaky data exfiltration methods. Discover how base64 encoding is utilized in macros and understand what to monitor for in your security efforts. Gain valuable insights into the world of cybersecurity and endpoint protection through this collaborative presentation by SecurityFWD and Varonis.

Syllabus

Countdown
Intro
What we're doing today
Excel Macro Document
Exploring the Macro
Attack Surface Reduction
Bypassing Defenses
Using Command and Control
Sneaky Data Exfiltration
Base64 Encoding in the Macro
What to Monitor For
Remote Code Execution
Kody Shout-out
Closing Thoughts
Endscreen


Taught by

SecurityFWD

Related Courses

Windows 10 Security Features
Microsoft via edX
Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera
Cybersecurity Compliance Framework & System Administration
IBM via Coursera
Cybersecurity Compliance and Framework
IBM via edX
Securing Microsoft Azure Data Access Endpoints
Pluralsight