From EK to DEK - An Analysis of Modern Document Exploit Kits

From EK to DEK - An Analysis of Modern Document Exploit Kits

BSidesLV via YouTube Direct link

COMPOUND MONIKER LOGIC EXPLOIT

8 of 17

8 of 17

COMPOUND MONIKER LOGIC EXPLOIT

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

From EK to DEK - An Analysis of Modern Document Exploit Kits

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 DOCUMENT EXPLOIT KITS
  3. 3 THREADKIT AND VENOMKIT
  4. 4 THREADKIT CAMPAIGN EXAMPLE
  5. 5 OLE OVERVIEW
  6. 6 THREADKIT INFECTION CHAIN EXAMPLE
  7. 7 VENOMKIT INFECTION CHAIN EXAMPLE
  8. 8 COMPOUND MONIKER LOGIC EXPLOIT
  9. 9 COMPOSITE MONKER OLE OBJECT
  10. 10 SCRIPTLET EXAMPLE
  11. 11 EQUATION EDITOR BUFFER OVERFLOW EXPLOITS
  12. 12 FONT RECORD BUFFER OVERFLOW
  13. 13 LOGFONT BUFFER OVERFLOW
  14. 14 ADOBE FLASH UAF - UAF TRIGGER
  15. 15 RED TEAM TECHNIQUE ADOPTION
  16. 16 CONCLUSION & TAKEAWAYS
  17. 17 ACKNOWLEDGEMENTS

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.