Главная
Study mode:
on
1
FAMILY
2
Metaspoit Macro Payload
3
Sometimes... A/V will get you
4
Helpful macro change...
5
Why not run powershell!
6
PowerSploit and Macros!
7
Prototype 2
8
64-bit payload? Which powershell?
9
Please help me create a payload..
10
Msfvenom and UNIX foo
11
Break up the VB payload string with continuation lines...
12
Too easy to detect?
13
Lets obfuscate things
14
Key management
15
Prototype 3
16
Automation time
17
The End...
Description:
Explore the resurgence of macro malware in MS Office documents through this 35-minute conference talk. Delve into various techniques for creating and obfuscating macro payloads, including Metasploit integration, PowerShell execution, and VBA string manipulation. Learn about antivirus evasion strategies, payload prototyping, and automation methods. Gain insights into key management and discover how to enhance the effectiveness of macro-based attacks in modern cybersecurity landscapes.

Macro Malware Lives - Putting the Sexy Back into MS Office Document Macros

Add to list
0:00 / 0:00