Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Office in Wonderland

Black Hat via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Embark on a journey through the vulnerabilities and exploitable features of Microsoft Office in this 51-minute Black Hat conference talk. Explore novel offensive techniques, including newly discovered Word and Excel vulnerabilities, and witness the security implications of the MS Office suite's architectural design. Delve into topics such as credential stealing, VBA alternatives, macros, shell code, Active File Format, Silk, compound files, module streams, and Evil Clippy. Learn about MZ bypass techniques and gain insights into the potential security risks lurking within seemingly innocuous Office features. Presented by Pieter Ceelen and Stan Hegt, this eye-opening session offers a comprehensive look at the hidden dangers within the Microsoft Office ecosystem.

Syllabus

Introduction
Demo
Fields
Credential stealing
Do we need VBA
Macros
Shell Code
Active File Format
Silk
Compound Files
Module Stream
Evil Clippy
MZ
Bypass MZ
Conclusion

Taught by

Black Hat

Reviews

Start your review of Office in Wonderland

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.