Persisting with Microsoft Office - Abusing Extensibility Options
Offered By: 44CON Information Security Conference via YouTube
Course Description
Overview
Explore techniques for abusing Microsoft Office's native functionality to achieve persistence in this 43-minute conference talk from 44CON 2017. Delve into various add-in mechanisms and their potential for exploitation, comparing their deployment complexity, privilege requirements, and effectiveness in Virtual Desktop Infrastructure (VDI) environments. Learn about the advantages and disadvantages of each persistence method from a red teamer's perspective. Conclude with an examination of detection and prevention strategies for these persistence mechanisms, enhancing your understanding of information security in Microsoft Office environments.
Syllabus
Persisting with Microsoft Office: Abusing Extensibility Options - William Knowles at 44CON 2017
Taught by
44CON Information Security Conference
Related Courses
VMware Horizon View 7.5 Essential TrainingLinkedIn Learning Citrix Virtual Apps and Desktops (CVAD): Deliver App and Desktop Resources
Pluralsight VMware Horizon 7.10 ESB: Introduction
Pluralsight Operate and maintain Azure Stack HCI
Microsoft via Microsoft Learn Amazon AppStream 2.0 Primer (Indonesian)
Amazon Web Services via AWS Skill Builder