A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Abusing RTF: Exploitation, Evasion and Exfiltration - Devon Greene Derbycon 2016 (Hacking Illustrated Series InfoSec Tutorial Videos)

Abusing RTF: Exploitation, Evasion and Exfiltration
Devon Greene
Derbycon 2016

If you knew how many ways you could obfuscate and deliver payloads with RTF documents, you would have thought it was a file format Microsoft secretively purchased from Adobe. 2016 has peeked my interest in the RTF specification, come learn why. This talk walks through examples that abuse the RTF specification and address these 3 key areas with RTF documents: Exploitation, Evasion and Exfiltration. Audience members will gain a technical understanding of: How this file format type is being leveraged in attacks today; Many ways RTF documents can be obfuscated to bypass security technologies; Ex-filtrate data in plain sight. So come check it out! I?ve got evasions so effective -- it?ll make you wanna slap yo? mama! Target Audience: Malware Analysts, Penetration Testers, Vulnerability Researchers, Network Security Engineers

Devon Greene is currently a Sr. Security Researcher at IXIA. Previously he has served as a 1 man SoC team in various financial institutions and possesses an extensive background in Penetration Testing, Incident Response, and Malware Analysis. Devon has a passion for CTFs, automation, technology, tool development, and outdoor life.

@DasMe_Devon

Back to Derbycon 2016 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast