Persisting with Microsoft Office - Abusing Extensibility Options
Offered By: 44CON Information Security Conference via YouTube
Course Description
Overview
Explore techniques for abusing Microsoft Office's native functionality to achieve persistence in this 43-minute conference talk from 44CON 2017. Delve into various add-in mechanisms and their potential for exploitation, comparing their deployment complexity, privilege requirements, and effectiveness in Virtual Desktop Infrastructure (VDI) environments. Learn about the advantages and disadvantages of each persistence method from a red teamer's perspective. Conclude with an examination of detection and prevention strategies for these persistence mechanisms, enhancing your understanding of information security in Microsoft Office environments.
Syllabus
Persisting with Microsoft Office: Abusing Extensibility Options - William Knowles at 44CON 2017
Taught by
44CON Information Security Conference
Related Courses
Introduction to Office 365 Development and APIsMicrosoft via edX Office 365: Managing Identities and Services with Hands-on Labs
Microsoft via edX Compliance in Office 365: eDiscovery
Microsoft via edX Compliance in Office 365: Data Governance
Microsoft via edX Microsoft Exchange Server 2016 - 5: Hybrid Topologies with Office 365
Microsoft via edX