YoVDO

Persisting with Microsoft Office - Abusing Extensibility Options

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Microsoft Office 365 Courses Virtual Desktop Infrastructure Courses

Course Description

Overview

Explore techniques for abusing Microsoft Office's native functionality to achieve persistence in this 43-minute conference talk from 44CON 2017. Delve into various add-in mechanisms and their potential for exploitation, comparing their deployment complexity, privilege requirements, and effectiveness in Virtual Desktop Infrastructure (VDI) environments. Learn about the advantages and disadvantages of each persistence method from a red teamer's perspective. Conclude with an examination of detection and prevention strategies for these persistence mechanisms, enhancing your understanding of information security in Microsoft Office environments.

Syllabus

Persisting with Microsoft Office: Abusing Extensibility Options - William Knowles at 44CON 2017


Taught by

44CON Information Security Conference

Related Courses

Introduction to Office 365 Development and APIs
Microsoft via edX
Office 365: Managing Identities and Services with Hands-on Labs
Microsoft via edX
Compliance in Office 365: eDiscovery
Microsoft via edX
Compliance in Office 365: Data Governance
Microsoft via edX
Microsoft Exchange Server 2016 - 5: Hybrid Topologies with Office 365
Microsoft via edX