Abusing RTF - Exploitation, Evasion, and Exfiltration

Abusing RTF - Exploitation, Evasion, and Exfiltration

via YouTube Direct link

Exploitation

20 of 23

20 of 23

Exploitation

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Abusing RTF - Exploitation, Evasion, and Exfiltration

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Blue Team Key Points
  3. 3 Red Team Key Points
  4. 4 RTF Features
  5. 5 Why Care
  6. 6 File Extension Tampering
  7. 7 Magic Files
  8. 8 Mixed Case
  9. 9 Evasions
  10. 10 In the wild
  11. 11 What does this mean
  12. 12 Bin substitution
  13. 13 Control words
  14. 14 More examples
  15. 15 How to fuzz
  16. 16 Peach
  17. 17 Demo
  18. 18 Food for thought
  19. 19 Forge Images
  20. 20 Exploitation
  21. 21 Exploit Tree
  22. 22 countermeasures
  23. 23 other failures

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.