Explore a 42-minute conference talk from x33fcon that delves into how threat actors are adapting their infection chain strategies in response to the post-MOTW (Mark of the Web) era and the deprecation of VBA macros, examining various innovative yet desperate approaches to achieving initial system access through multi-step file format combinations, while demonstrating how these seemingly convoluted techniques can pose significant security risks to both organizations and individuals when strategically linked together.
Overview
Syllabus
02. Desperate Infection Chains - Multi-Step Initial Access Strategies by Mariusz Banach
Taught by
x33fcon