Media Summary: In this workshop (2 hours), I explain how to use the tools (oledump, emldump, YARA rules, …) I developed to Can you trust your 3rd party software? We can help you. Fill out this form β†’ One of the key features in VMRay Analyzer 2.0 is the built-in reputation engine that identifies known

Analyzing Malicious Office Documents Presented - Detailed Analysis & Overview

In this workshop (2 hours), I explain how to use the tools (oledump, emldump, YARA rules, …) I developed to Can you trust your 3rd party software? We can help you. Fill out this form β†’ One of the key features in VMRay Analyzer 2.0 is the built-in reputation engine that identifies known In case you didn't have time for our 2-minutes introduction to the topic ( :) More information at:Β ... Ring Ø Labs: How do you get started in # REcon 2008 Hacking conference , , , , , .

Photo Gallery

Malware Analysis - Malicious MS Office files without Macros
Analyzing Malicious Office Documents   Presented By  Didier Stevens Workshop
How to investigate malicious Microsoft Office files
πŸŽ₯ LIVE: Getting Started Analyzing Malicious Office Documents
How to Analyze a Malicious Word Document
Methods For Analyzing Malicious Office Documents (Recon 2008)
Analyzing a Malicious Microsoft Word Document
πŸŽ₯ Getting Started Analyzing Malicious Excel Documents
28-Seconds Malicious Microsoft Excel Document Analysis
Malicious OneNote Documents - Malware Analysis
Malware Analysis of Malicious Documents
Malware Analysis - Malicious Office Document Metadata
View Detailed Profile
Malware Analysis - Malicious MS Office files without Macros

Malware Analysis - Malicious MS Office files without Macros

We look at two techniques for

Analyzing Malicious Office Documents   Presented By  Didier Stevens Workshop

Analyzing Malicious Office Documents Presented By Didier Stevens Workshop

In this workshop (2 hours), I explain how to use the tools (oledump, emldump, YARA rules, …) I developed to

How to investigate malicious Microsoft Office files

How to investigate malicious Microsoft Office files

MCSI Certified DFIR Specialist https://www.mosse-institute.com/certifications/mdfir-certified-dfir-specialist.html MCSIΒ ...

πŸŽ₯ LIVE: Getting Started Analyzing Malicious Office Documents

πŸŽ₯ LIVE: Getting Started Analyzing Malicious Office Documents

Learn how to get started

How to Analyze a Malicious Word Document

How to Analyze a Malicious Word Document

Can you trust your 3rd party software? We can help you. Fill out this form β†’ https://register.reversinglabs.com/solarwinds-breachΒ ...

Methods For Analyzing Malicious Office Documents (Recon 2008)

Methods For Analyzing Malicious Office Documents (Recon 2008)

Full Video Details: http://www.securitytube.net/video/284.

Analyzing a Malicious Microsoft Word Document

Analyzing a Malicious Microsoft Word Document

One of the key features in VMRay Analyzer 2.0 is the built-in reputation engine that identifies known

πŸŽ₯ Getting Started Analyzing Malicious Excel Documents

πŸŽ₯ Getting Started Analyzing Malicious Excel Documents

Get started

28-Seconds Malicious Microsoft Excel Document Analysis

28-Seconds Malicious Microsoft Excel Document Analysis

In case you didn't have time for our 2-minutes introduction to the topic (https://youtu.be/pSWfD-lMf4I). :) More information at:Β ...

Malicious OneNote Documents - Malware Analysis

Malicious OneNote Documents - Malware Analysis

Learn how to

Malware Analysis of Malicious Documents

Malware Analysis of Malicious Documents

Access the course here: https://www.udemy.com/course/

Malware Analysis - Malicious Office Document Metadata

Malware Analysis - Malicious Office Document Metadata

Ring Ø Labs: https://RingZeroLabs.com How do you get started in #

Malicious Office Document DDE Analysis in 30 seconds

Malicious Office Document DDE Analysis in 30 seconds

Analysis of

Detecting malicious documents | YARA Tutorial | eForensics Magazine

Detecting malicious documents | YARA Tutorial | eForensics Magazine

In this video from our

Cybersecurity SOC Analyst Lab - Malware Analysis (RTF Document)

Cybersecurity SOC Analyst Lab - Malware Analysis (RTF Document)

Dive into the intriguing world of

Malware analysis on Microsoft office documents - Threat Hunting like a pro | DFIR

Malware analysis on Microsoft office documents - Threat Hunting like a pro | DFIR

Ever imagined a simple Word

Bruce Dang Methods for analyzing malicious Office documents

Bruce Dang Methods for analyzing malicious Office documents

REcon 2008 Hacking conference #hacking, #hackers, #infosec, #opsec, #IT, #security.

Malicious Excel Document Analysis in Cerbero Suite

Malicious Excel Document Analysis in Cerbero Suite

This video is an introduction of how to

517 Malicious Office Doc Analysis for EVERYONE Doug Burns

517 Malicious Office Doc Analysis for EVERYONE Doug Burns

These are the videos from Derbycon 2016: http://www.irongeek.com/i.php?page=videos/derbycon6/mainlist.