Главная
Study mode:
on
1
Countdown
2
Intro
3
What we're doing today
4
Excel Macro Document
5
Exploring the Macro
6
Attack Surface Reduction
7
Bypassing Defenses
8
Using Command and Control
9
Sneaky Data Exfiltration
10
Base64 Encoding in the Macro
11
What to Monitor For
12
Remote Code Execution
13
Kody Shout-out
14
Closing Thoughts
15
Endscreen
Description:
Explore the intricacies of bypassing endpoint controls using Office macros in this 48-minute video featuring Kilian from Varonis. Dive into the creation of a "malicious" document that evades security measures, establishes command and control channels, and executes remote code. Learn about Excel macro documents, attack surface reduction techniques, and sneaky data exfiltration methods. Discover how base64 encoding is utilized in macros and understand what to monitor for in your security efforts. Gain valuable insights into the world of cybersecurity and endpoint protection through this collaborative presentation by SecurityFWD and Varonis.

Bypassing Endpoint Controls Using Office Macros - Techniques and Defenses

SecurityFWD
Add to list
0:00 / 0:00