Normal view
How to Get Malicious Macros Past Email Filters
Carrie Roberts // Β Β Β A malicious macro in a Microsoft Word or Excel document is an effective hacking technique. These documents could be delivered in a variety of [β¦]
The post How to Get Malicious Macros Past Email Filters appeared first on Black Hills Information Security, Inc..
Bugging Microsoft Files: Part 3 β Clearing Metadata
Ethan Robish // In my last twoΒ postsΒ I showed how to insert tracking bugs in both .docx (Part 1) and .xlsx files (Part 2). Β But donβt let all that effort go [β¦]
The post Bugging Microsoft Files: Part 3 β Clearing Metadata appeared first on Black Hills Information Security, Inc..
-
Black Hills Information Security
- Bugging Microsoft Files: Part 2 β Xlsx Files using Microsoft Excel
Bugging Microsoft Files: Part 2 β Xlsx Files using Microsoft Excel
Ethan Robish // As promised in my previous post, part 1, this post shows how to place a tracking bug in a native .xlsx file. Β Full credit for this method [β¦]
The post Bugging Microsoft Files: Part 2 β Xlsx Files using Microsoft Excel appeared first on Black Hills Information Security, Inc..