Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Methods for Understanding Targeted Attacks with Office Documents

Type
Audio
Tags
Office
Authors
Bruce Dang
Event
Chaos Communication Congress 25th (25C3) 2008
Indexed on
Mar 27, 2013
URL
http://ftp.ccc.de/congress/25c3/audio_only/25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.mp3
File name
25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.mp3
File size
23.3 MB
MD5
a99f7f070e03b5931597feda86afb9f2
SHA1
e50b542aa7b3085afcd98b6b478c0d5824d14a2b

As more security features and anti-exploitation mechanisms are added to modern operating systems, attackers are changing their targets to higher-level applications. In the last few years, we have seen increasing targeted attacks using malicious Office documents against both government and non-government entities. These attacks are well publicized in the media; unfortunately, there is not much public information on attack details or exploitation mechanisms employed in the attacks themselves.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !