Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Persisting with Microsoft Office - Abusing Extensibility Options

44CON Information Security Conference via YouTube

Overview

Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore techniques for abusing Microsoft Office's native functionality to achieve persistence in this 43-minute conference talk from 44CON 2017. Delve into various add-in mechanisms and their potential for exploitation, comparing their deployment complexity, privilege requirements, and effectiveness in Virtual Desktop Infrastructure (VDI) environments. Learn about the advantages and disadvantages of each persistence method from a red teamer's perspective. Conclude with an examination of detection and prevention strategies for these persistence mechanisms, enhancing your understanding of information security in Microsoft Office environments.

Syllabus

Persisting with Microsoft Office: Abusing Extensibility Options - William Knowles at 44CON 2017

Taught by

44CON Information Security Conference

Reviews

Start your review of Persisting with Microsoft Office - Abusing Extensibility Options

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.