Watch Hackers Craft Malicious Office Macros (ft. Kilian from SecurityFWD)

Published: 01 January 1970
on channel: Null Byte
43,714
1.8k

So many attacks start with a simple booby-trapped document that runs malicious code. Crafty attackers can even customize the payload to bypass endpoint controls! Don’t believe us? Check out this epic cross-over event, where Kilian from SecurityFWD meets with Kody from Null Byte/SecurityFWD to explore how an attacker would build a “malicious” document that bypasses endpoint controls, establishes a C&C channel, and more!

Subscribe to Null Byte: https://goo.gl/J6wEnH
Kody's Twitter:   / kodykinzie  

SecurityFWD:    / securityfwd  
Varonis:    / varonissystems  


Chapters:
0:00 Countdown
0:35 Intro
7:10 What are we doing today?
11:05 Macros and Social Engineering
14:25 Hello World of Macros
16:28 Auto Opening Macro
17:50 Grabbing System Details
20:35 Windows Defender
24:10 Bypassing Windows Defender
28:20 Process Explorer
30:25 Remote Connection
35:10 Send and Receive Data via Post
39:50 What this looks like in Wireshark
43:25 Sending Encrypted Data
51:20 Command and Control
54:40 Popping Calc
56:50 Closing Thoughts


Follow Null Byte on:
Twitter:   / nullbyte  
Flipboard: https://flip.it/3.Gf_0
Website: https://null-byte.com
Vimeo: https://vimeo.com/channels/nullbyte


Watch video Watch Hackers Craft Malicious Office Macros (ft. Kilian from SecurityFWD) online without registration, duration hours minute second in high quality. This video was added by user Null Byte 01 January 1970, don't forget to share it with your friends and acquaintances, it has been viewed on our site 43,71 once and liked it 1.8 thousand people.