YoVDO

Persisting with Microsoft Office - Abusing Extensibility Options

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Microsoft Office 365 Courses Virtual Desktop Infrastructure Courses

Course Description

Overview

Explore techniques for abusing Microsoft Office's native functionality to achieve persistence in this 43-minute conference talk from 44CON 2017. Delve into various add-in mechanisms and their potential for exploitation, comparing their deployment complexity, privilege requirements, and effectiveness in Virtual Desktop Infrastructure (VDI) environments. Learn about the advantages and disadvantages of each persistence method from a red teamer's perspective. Conclude with an examination of detection and prevention strategies for these persistence mechanisms, enhancing your understanding of information security in Microsoft Office environments.

Syllabus

Persisting with Microsoft Office: Abusing Extensibility Options - William Knowles at 44CON 2017


Taught by

44CON Information Security Conference

Related Courses

VMware Horizon View 7.5 Essential Training
LinkedIn Learning
Citrix Virtual Apps and Desktops (CVAD): Deliver App and Desktop Resources
Pluralsight
VMware Horizon 7.10 ESB: Introduction
Pluralsight
Operate and maintain Azure Stack HCI
Microsoft via Microsoft Learn
Amazon AppStream 2.0 Primer (Indonesian)
Amazon Web Services via AWS Skill Builder