Download presentation
Presentation is loading. Please wait.
Published byWarren Beasley Modified over 9 years ago
1
Windows XP File-Based Attacks Chris Dalbec & Chris Woodard
2
Overview Why This Topic Why This Topic Background Background Macros Macros Other Files Other Files Lab Contents Lab Contents
3
Motivation File-Based attacks are popular over email and peer to peer programs File-Based attacks are popular over email and peer to peer programs New unpatched exploits New unpatched exploits Unaddressed in previous labs Unaddressed in previous labs
4
Macros Some of the most common windows programs allow for macros Some of the most common windows programs allow for macros Macros are mini programs ran inside Microsoft office documents for efficiency Macros are mini programs ran inside Microsoft office documents for efficiency Macros are can execute programs installed on windows Macros are can execute programs installed on windows
5
When Good Macros Go Bad One of the most popular internet attacks come from the downloading of macro enabled documents One of the most popular internet attacks come from the downloading of macro enabled documents Why are they so potentially dangerous Why are they so potentially dangerous
6
Other Files Malformed Word Doc Malformed Word Doc HTML Files HTML Files Vector Markup Language Vector Markup Language MSHTML MSHTML Windows Metafile Windows Metafile
7
Section 1 - Macros This portion of the lab will focus on macro attack This portion of the lab will focus on macro attack The student will: The student will: follow the procedure to produce a virus follow the procedure to produce a virus Inspect and investigate the created virus Inspect and investigate the created virus Run the virus exploit Run the virus exploit Review and test safe measure to prevent the exploit Review and test safe measure to prevent the exploit
8
Short video of Exploit Walrus Virus Editor in action!
9
Section 2 - Other Attacks Students will learn how to defend against HTML based Attacks HTML based Attacks Malformed Word Documents Malformed Word Documents WMF Attacks WMF Attacks
10
References www.wikipedia.org www.wikipedia.org www.wikipedia.org www.milw0rm.com www.milw0rm.com
11
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.