Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Multi-Step Initial Access Strategies: Desperate Infection Chains - Part 2

x33fcon via YouTube

Overview

Explore a 42-minute conference talk from x33fcon that delves into how threat actors are adapting their infection chain strategies in response to the post-MOTW (Mark of the Web) era and the deprecation of VBA macros, examining various innovative yet desperate approaches to achieving initial system access through multi-step file format combinations, while demonstrating how these seemingly convoluted techniques can pose significant security risks to both organizations and individuals when strategically linked together.

Syllabus

02. Desperate Infection Chains - Multi-Step Initial Access Strategies by Mariusz Banach

Taught by

x33fcon

Reviews

Start your review of Multi-Step Initial Access Strategies: Desperate Infection Chains - Part 2

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.