Media Summary: Microsoft office is something i guess everybody uses it and knows about it and you are a regular computer user then to somewhat ... In this workshop (2 hours), I explain how to use the tools (oledump, emldump, YARA rules, …) I developed to In case you didn't have time for our 2-minutes introduction to the topic ( :) More information at: ...

Analyze Macro Code From Malicious Documents - Detailed Analysis & Overview

Microsoft office is something i guess everybody uses it and knows about it and you are a regular computer user then to somewhat ... In this workshop (2 hours), I explain how to use the tools (oledump, emldump, YARA rules, …) I developed to In case you didn't have time for our 2-minutes introduction to the topic ( :) More information at: ... Hello world and welcome to HaXeZ, in this post I'm going to be explaining how you can hack anyone with a Microsoft Office ... In this video, we'll take a look at a recent Emotet maldoc and learn how to use the Microsoft Office Integrated Development ... Additional information about the debugging can be found on the blog: ...

One of the key features in VMRay Analyzer 2.0 is the built-in reputation engine that identifies known

Photo Gallery

Analyze Macro Code from Malicious Documents
Analyzing Malicious Office Documents   Presented By  Didier Stevens Workshop
Malware Analysis - Malicious MS Office files without Macros
Malicious Document : Macro Password Removal
#HITB2018AMS CommSec D1 - A Deep Dive Into Malicious Documents - Josh Stroschein
28-Seconds Malicious Microsoft Excel Document Analysis
Deobfuscate malicious macro
Malware Analysis Analyzing VBA Macros   Shellcode Injection
CPTC - Malicious Macros
Do Data entry by using Macros in Excel #macros #vba #excel
Making Malicious Microsoft Office Files For Hacking
Analyzing Macros with the Office IDE
View Detailed Profile
Analyze Macro Code from Malicious Documents

Analyze Macro Code from Malicious Documents

Microsoft office is something i guess everybody uses it and knows about it and you are a regular computer user then to somewhat ...

Analyzing Malicious Office Documents   Presented By  Didier Stevens Workshop

Analyzing Malicious Office Documents Presented By Didier Stevens Workshop

In this workshop (2 hours), I explain how to use the tools (oledump, emldump, YARA rules, …) I developed to

Malware Analysis - Malicious MS Office files without Macros

Malware Analysis - Malicious MS Office files without Macros

We look at two techniques for MS Office

Malicious Document : Macro Password Removal

Malicious Document : Macro Password Removal

Additional walkthrough with

#HITB2018AMS CommSec D1 - A Deep Dive Into Malicious Documents - Josh Stroschein

#HITB2018AMS CommSec D1 - A Deep Dive Into Malicious Documents - Josh Stroschein

Office

28-Seconds Malicious Microsoft Excel Document Analysis

28-Seconds Malicious Microsoft Excel Document Analysis

In case you didn't have time for our 2-minutes introduction to the topic (https://youtu.be/pSWfD-lMf4I). :) More information at: ...

Deobfuscate malicious macro

Deobfuscate malicious macro

We will concentrate on

Malware Analysis Analyzing VBA Macros   Shellcode Injection

Malware Analysis Analyzing VBA Macros Shellcode Injection

In this deep-dive episode, we

CPTC - Malicious Macros

CPTC - Malicious Macros

... like into a

Do Data entry by using Macros in Excel #macros #vba #excel

Do Data entry by using Macros in Excel #macros #vba #excel

Automate Data Entry in Excel with

Making Malicious Microsoft Office Files For Hacking

Making Malicious Microsoft Office Files For Hacking

Hello world and welcome to HaXeZ, in this post I'm going to be explaining how you can hack anyone with a Microsoft Office ...

Analyzing Macros with the Office IDE

Analyzing Macros with the Office IDE

In this video, we'll take a look at a recent Emotet maldoc and learn how to use the Microsoft Office Integrated Development ...

Malicious Document: Macros VBEditing

Malicious Document: Macros VBEditing

Additional information about the debugging can be found on the blog: ...

Malicious Excel Document Analysis in Cerbero Suite

Malicious Excel Document Analysis in Cerbero Suite

This video is an introduction of how to

Malware Analysis | How to Analyze a VBA Maldoc

Malware Analysis | How to Analyze a VBA Maldoc

In this video, we

Analyzing a Malicious Microsoft Word Document

Analyzing a Malicious Microsoft Word Document

One of the key features in VMRay Analyzer 2.0 is the built-in reputation engine that identifies known

How to analyze malicious office documents (dumping macro and extracting IOCs) #malware

How to analyze malicious office documents (dumping macro and extracting IOCs) #malware

In this video, we'll dump

#2 How To Analyse a Malicious Word Document

#2 How To Analyse a Malicious Word Document

This video will teach you how to

Static Malicious Document Analysis

Static Malicious Document Analysis

0:00 Intro 1:50 md5 value of the

SOC Malware Analysis – Malicious VBA Macro Investigation (LetsDefend Challenge)

SOC Malware Analysis – Malicious VBA Macro Investigation (LetsDefend Challenge)

SOC-style