Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore advanced techniques for exploiting, evading detection, and exfiltrating data using RTF (Rich Text Format) in this 31-minute conference talk from Derbycon 2016. Dive into key points for both blue and red teams, examining RTF features, file extension tampering, magic files, and various evasion methods. Learn about real-world examples, bin substitution, control words, and fuzzing techniques using tools like Peach. Discover how to forge images, exploit vulnerabilities, and understand the exploit tree. Gain insights into countermeasures and potential failures, equipping yourself with valuable knowledge for both offensive and defensive cybersecurity strategies.