Media Summary: Get started analyzing malicious excel documents In this workshop (2 hours), I explain how to use the tools (oledump, emldump, YARA rules, …) I developed to In case you didn't have time for our 2-minutes introduction to the topic ( :) More information at: ...

Live Getting Started Analyzing Malicious Office Documents - Detailed Analysis & Overview

Get started analyzing malicious excel documents In this workshop (2 hours), I explain how to use the tools (oledump, emldump, YARA rules, …) I developed to In case you didn't have time for our 2-minutes introduction to the topic ( :) More information at: ... Can you trust your 3rd party software? We can help you. Fill out this form → Did you know that you could infect your computer In this full series we will talk about Incident Response and it will be a Free Training Course for everyone. Today is Day-15 and I ...

One of the key features in VMRay Analyzer 2.0 is the built-in reputation engine that identifies known

Photo Gallery

🎥 LIVE: Getting Started Analyzing Malicious Office Documents
🎥 Getting Started Analyzing Malicious Excel Documents
Analyzing Malicious Office Documents   Presented By  Didier Stevens Workshop
How to investigate malicious Microsoft Office files
Methods For Analyzing Malicious Office Documents (Recon 2008)
28-Seconds Malicious Microsoft Excel Document Analysis
Lab Setup for Analyzing Malicious Files and Executables
How to Analyze a Malicious Word Document
Malicious Office Document DDE Analysis in 30 seconds
Malicious Excel Document Analysis in Cerbero Suite
Malware Analysis of Malicious Documents - Course Overview
LIVE: How to Get Started with Malware Analysis and Reverse Engineering!
View Detailed Profile
🎥 LIVE: Getting Started Analyzing Malicious Office Documents

🎥 LIVE: Getting Started Analyzing Malicious Office Documents

Learn how to

🎥 Getting Started Analyzing Malicious Excel Documents

🎥 Getting Started Analyzing Malicious Excel Documents

Get started analyzing malicious excel documents

Analyzing Malicious Office Documents   Presented By  Didier Stevens Workshop

Analyzing Malicious Office Documents Presented By Didier Stevens Workshop

In this workshop (2 hours), I explain how to use the tools (oledump, emldump, YARA rules, …) I developed to

How to investigate malicious Microsoft Office files

How to investigate malicious Microsoft Office files

MCSI Certified DFIR Specialist https://www.mosse-institute.com/certifications/mdfir-certified-dfir-specialist.html MCSI ...

Methods For Analyzing Malicious Office Documents (Recon 2008)

Methods For Analyzing Malicious Office Documents (Recon 2008)

Full Video Details: http://www.securitytube.net/video/284.

28-Seconds Malicious Microsoft Excel Document Analysis

28-Seconds Malicious Microsoft Excel Document Analysis

In case you didn't have time for our 2-minutes introduction to the topic (https://youtu.be/pSWfD-lMf4I). :) More information at: ...

Lab Setup for Analyzing Malicious Files and Executables

Lab Setup for Analyzing Malicious Files and Executables

MCSI Certified DFIR Specialist https://www.mosse-institute.com/certifications/mdfir-certified-dfir-specialist.html MCSI ...

How to Analyze a Malicious Word Document

How to Analyze a Malicious Word Document

Can you trust your 3rd party software? We can help you. Fill out this form → https://register.reversinglabs.com/solarwinds-breach ...

Malicious Office Document DDE Analysis in 30 seconds

Malicious Office Document DDE Analysis in 30 seconds

Analysis

Malicious Excel Document Analysis in Cerbero Suite

Malicious Excel Document Analysis in Cerbero Suite

This video is an introduction of how to

Malware Analysis of Malicious Documents - Course Overview

Malware Analysis of Malicious Documents - Course Overview

Did you know that you could infect your computer

LIVE: How to Get Started with Malware Analysis and Reverse Engineering!

LIVE: How to Get Started with Malware Analysis and Reverse Engineering!

Learn how to

Cybersecurity SOC Analyst Lab - Malware Analysis (RTF Document)

Cybersecurity SOC Analyst Lab - Malware Analysis (RTF Document)

Dive into the intriguing world of

Incident Response Training Course, Malicious Document Analysis, Day 15

Incident Response Training Course, Malicious Document Analysis, Day 15

In this full series we will talk about Incident Response and it will be a Free Training Course for everyone. Today is Day-15 and I ...

Analyzing a Malicious Microsoft Word Document

Analyzing a Malicious Microsoft Word Document

One of the key features in VMRay Analyzer 2.0 is the built-in reputation engine that identifies known