Completed
ACKNOWLEDGEMENTS
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
From EK to DEK - An Analysis of Modern Document Exploit Kits
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 DOCUMENT EXPLOIT KITS
- 3 THREADKIT AND VENOMKIT
- 4 THREADKIT CAMPAIGN EXAMPLE
- 5 OLE OVERVIEW
- 6 THREADKIT INFECTION CHAIN EXAMPLE
- 7 VENOMKIT INFECTION CHAIN EXAMPLE
- 8 COMPOUND MONIKER LOGIC EXPLOIT
- 9 COMPOSITE MONKER OLE OBJECT
- 10 SCRIPTLET EXAMPLE
- 11 EQUATION EDITOR BUFFER OVERFLOW EXPLOITS
- 12 FONT RECORD BUFFER OVERFLOW
- 13 LOGFONT BUFFER OVERFLOW
- 14 ADOBE FLASH UAF - UAF TRIGGER
- 15 RED TEAM TECHNIQUE ADOPTION
- 16 CONCLUSION & TAKEAWAYS
- 17 ACKNOWLEDGEMENTS