In the post-MOTW era, when VBA macros are gone, Threat Actors devise multi-click infection chains to continue their shady business. Some approaches look really desperate, nonetheless quite ingenuine. This talk describes how various file formats can be chained together to achieve Initial Access.
In the post-MOTW era, when VBA macros are gone, Threat Actors devise multi-click infection chains to continue their shady business. Some approaches look really desperate, nonetheless quite ingenuine. This talk describes how various file formats can be chained together to achieve Initial Access. We are going to cover various ideas that when linked together, can pose threat to organisations and individuals in an unique, but a bit convoluted approach.
Watch video 02. Desperate Infection Chains - Multi-Step Initial Access Strategies by Mariusz Banach online without registration, duration hours minute second in high quality. This video was added by user x33fcon 21 August 2023, don't forget to share it with your friends and acquaintances, it has been viewed on our site 2,285 once and liked it 58 people.