Analyzing Macro Embedded Malware | Introduction to Reverse Engineering
Analyzing Macro Embedded Malware: Macros are essentially scripts written in VBA (Visual Basic for Applications), a language used inside Office documents for automating frequent tasks and activities. Since they can interact with the system, attackers can use them as a starting point for the attack. π Interesting Infosecaddicts Blogpost: β Click Here: https://infosecaddicts.com/pentestbox-a-great-set-of-tools-to-start-tests/ β Click Here: https://infosecaddicts.com/free-advanced-network-pen-testing-webinar/ β Click Here for other posts: https://infosecaddicts.com/ π Join Our Free 21 Day hack-a-thon π β Register Here: https://infosecaddicts.com/free-21-day-hack-a-thon/ πSome Courses you may be interested inπ β Defensive Cyber β Malware Analysis [https://mailchi.mp/infosecaddicts/malware-analysis] β Incident Response β Reverse Engineering [https://mailchi.mp/infosecaddicts/reverse-engineering] β Offensive Cyber β Network Penetration Tester [https://mailchi.mp/infosecaddicts/network-penetration-tester] β Web App Penetration Tester [https://mailchi.mp/infosecaddicts/web-app-penetration-tester] β Red Team professional π Joe has some free challenges available if you're interested in joining in you can contact us using this link https://infosecaddicts.com/contact-us/ π You can also sign up for a customized plan https://infosecaddicts.com/customized-program/ if you need help/guidance in your career or in learning something new. #pentesting #webservers #OSCP #Mentorship π If you would like to learn more about our mentorship program you can sign up here https://mailchi.mp/infosecaddicts/mentorship π SOCIAL NETWORKS βοΈLike "InfosecAddicts" on Facebook HERE: http://bit.ly/2WQCK9a βοΈFollow InfosecAddicts on Twitter HERE: http://bit.ly/2JbIsxJ πΌ Connect with us on LinkedIn http://bit.ly/LinkedIn_InfosecAddicts ---------------------------------------------------------------------------------------- β This content is for educational purposes only. InfosecAddicts focuses on training and preparing professionals and enthusiasts, to perform Ethical Hacking, penetration testing tasks focusing on prevention and security, and developing the advancement and discussion of the Cybersecurity Field π² TRADEMARK LEGAL NOTICE: All product names, logos, videos, and brands are the property of their respective owners in the United States and/or other countries. All company, product, and service names used in this video are for identification purposes only. The use of these names, logos, and brands does not imply endorsement. #BlueTeam #Malware #MalwareAnalysis
Download
1 formatsVideo Formats
Right-click 'Download' and select 'Save Link As' if the file opens in a new tab.