Главная
Study mode:
on
1
Introduction
2
Office Online Server
3
Questions
4
Why Excel
5
Oneshot exploits
6
Formulas
7
My experience
8
Text join
9
Analysis
10
Exploit
11
Constraints
12
Memory Leak
13
Scenario
14
Cross Fingers
15
Undo
16
Workarounds
17
String Package
18
Checking all formulas
19
Graphs and charts
20
Read primitive
21
Onprem
22
Demo
23
Is it possible
24
QA
Description:
Explore an in-depth analysis of exploiting Excel Online in this Black Hat conference talk. Delve into the discovery and exploitation of an integer overflow vulnerability (CVE-2018-8331) in the fnConcatenate formula. Learn how Excel formulas can be chained together to achieve remote code execution on the Office Web Application server. Examine the challenges, constraints, and techniques involved in developing this exploit, including memory leaks, string manipulation, and formula analysis. Gain insights into the security implications for online applications and understand the unique perspective of the Microsoft Security Response Center. Discover the potential risks associated with malicious documents targeting online platforms and the complexities of attacking Office Web Application servers.

Exploiting Excel Online

Black Hat
Add to list