Media Summary: In this workshop (2 hours), I explain how to use the tools (oledump, emldump, YARA rules, …) I developed to In case you didn't have time for our 2-minutes introduction to the topic ( :) More information at: ... Today we tackle the new exercises in Lets Defend, these are

Malicious Office Document Dde Analysis In 30 Seconds - Detailed Analysis & Overview

In this workshop (2 hours), I explain how to use the tools (oledump, emldump, YARA rules, …) I developed to In case you didn't have time for our 2-minutes introduction to the topic ( :) More information at: ... Today we tackle the new exercises in Lets Defend, these are 0:00 Intro 0:17 Course content 0:45 Why should we worry about Microsoft Ring Ø Labs: How do you get started in # 0:00 Intro 2:00 olemeta 4:02 oleid 6:50 olevba You can access this course on LetsDefend for doing practice online: ...

Did you know that you could infect your computer just by opening a pdf or Microsoft

Photo Gallery

Malicious Office Document DDE Analysis in 30 seconds
Analyzing Malicious Office Documents   Presented By  Didier Stevens Workshop
How to investigate malicious Microsoft Office files
28-Seconds Malicious Microsoft Excel Document Analysis
Malware Analysis - Malicious Doc
Doc & RTF Malicious Document
Analyze Malicious PDF, DOCX & XLSX in Kali Linux — pdfid + oletools Tutorial
🎥 LIVE: Getting Started Analyzing Malicious Office Documents
Introduction to Malicious Document File Analysis
Malware Analysis - Malicious Office Document Metadata
Methods For Analyzing Malicious Office Documents (Recon 2008)
Malware analysis on Microsoft office documents - Threat Hunting like a pro | DFIR
View Detailed Profile
Malicious Office Document DDE Analysis in 30 seconds

Malicious Office Document DDE Analysis in 30 seconds

Analysis

Analyzing Malicious Office Documents   Presented By  Didier Stevens Workshop

Analyzing Malicious Office Documents Presented By Didier Stevens Workshop

In this workshop (2 hours), I explain how to use the tools (oledump, emldump, YARA rules, …) I developed to

How to investigate malicious Microsoft Office files

How to investigate malicious Microsoft Office files

MCSI Certified DFIR Specialist https://www.mosse-institute.com/certifications/mdfir-certified-dfir-specialist.html MCSI ...

28-Seconds Malicious Microsoft Excel Document Analysis

28-Seconds Malicious Microsoft Excel Document Analysis

In case you didn't have time for our 2-minutes introduction to the topic (https://youtu.be/pSWfD-lMf4I). :) More information at: ...

Malware Analysis - Malicious Doc

Malware Analysis - Malicious Doc

Today we tackle the new exercises in Lets Defend, these are

Doc & RTF Malicious Document

Doc & RTF Malicious Document

More info: https://videos.didierstevens.com/2021/01/26/

Analyze Malicious PDF, DOCX & XLSX in Kali Linux — pdfid + oletools Tutorial

Analyze Malicious PDF, DOCX & XLSX in Kali Linux — pdfid + oletools Tutorial

In today's video we

🎥 LIVE: Getting Started Analyzing Malicious Office Documents

🎥 LIVE: Getting Started Analyzing Malicious Office Documents

Learn how to get started analyzing

Introduction to Malicious Document File Analysis

Introduction to Malicious Document File Analysis

0:00 Intro 0:17 Course content 0:45 Why should we worry about Microsoft

Malware Analysis - Malicious Office Document Metadata

Malware Analysis - Malicious Office Document Metadata

Ring Ø Labs: https://RingZeroLabs.com How do you get started in #

Methods For Analyzing Malicious Office Documents (Recon 2008)

Methods For Analyzing Malicious Office Documents (Recon 2008)

Full Video Details: http://www.securitytube.net/video/284.

Malware analysis on Microsoft office documents - Threat Hunting like a pro | DFIR

Malware analysis on Microsoft office documents - Threat Hunting like a pro | DFIR

Ever imagined a simple Word

More Details About Document File Analysis 1

More Details About Document File Analysis 1

0:00 Intro 2:00 olemeta 4:02 oleid 6:50 olevba You can access this course on LetsDefend for doing practice online: ...

How to analyze malicious office documents (dumping macro and extracting IOCs) #malware

How to analyze malicious office documents (dumping macro and extracting IOCs) #malware

In this video, we'll dump

Analyzing a Malicious Microsoft Word Document

Analyzing a Malicious Microsoft Word Document

One of the key features in VMRay

Malicious Excel Document Analysis in Cerbero Suite

Malicious Excel Document Analysis in Cerbero Suite

This video is an introduction of how to

Malware Analysis of Malicious Documents - Course Overview

Malware Analysis of Malicious Documents - Course Overview

Did you know that you could infect your computer just by opening a pdf or Microsoft

Analyze Macro Code from Malicious Documents

Analyze Macro Code from Malicious Documents

Microsoft