Loading...
「ツール」は右上に移動しました。
利用したサーバー: wtserver2
13いいね 441回再生

Office Docs based malware analysis- Click to Exploit: Office documents

Ever imagined a simple Word document opening a reverse shell on your system?
This video uncovers the real-world dangers of document-based malware — and how attackers still use Office macros to compromise machines in 2025.

🧠 In this complete tutorial, you’ll learn:

✅ What is malware, its types, and how it spreads
✅ How attackers weaponize .docm files with obfuscated macros
✅ Static analysis using tools like oletools, yara, strings, and more
✅ Deep dive into AutoOpen, Document_Open, and reverse shell payloads
✅ How defenders analyze and detect these threats like pros

📖 Read the Full Medium Blog (with all commands & explanations):
👉 medium.com/@deepanshu_khanna/️-️-document-based-ma…

💻 Explore the GitHub Project (tools, samples, scripts):
👉 github.com/deep1792/threat-hunting/tree/main/Docum…

📬 Connect on LinkedIn (Collaborations, Feedback, Questions):
👉 www.linkedin.com/in/deepanshukhanna/

🎓 Great for:
Ethical Hackers, SOC Analysts, DFIR Pros, Cybersecurity Students, Red/Blue Teams

💥 Subscribe + Like for more labs on malware, Kubernetes forensics, threat hunting, and cyber defense content!

#KubernetesSecurity
#ThreatHunting
#CyberSecurity
#KubernetesForensics
#RedTeamOps
#MalwareAnalysis
#CloudSecurity
#Falco
#Loki
#Grafana
#CyberThreatIntelligence
#InfoSecTraining
#HackingLab
#SecurityResearch
#DevSecOps

コメント