Jan. 23, 2023, 4 p.m. | Dr Josh Stroschein

Dr Josh Stroschein www.youtube.com

Threat actors and red teams alike are always looking for, and finding, creative ways to gain initial access. Such is the case with the recent surge in the use of Microsoft OneNote files. Similar in purpose to macro-enabled office documents, OneNote files allow the embedding of scripting technology to run arbitrary commands and gives the ability to drop or download malicious programs. In this video, we'll take a look at a recent OneNote file to investigate it's structure. We'll use …

access asyncrat case documents download files initial access macro malicious malware microsoft microsoft onenote office onenote red teams run scripting teams technology threat threat actors tips video

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Senior Security Researcher - Linux MacOS EDR (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Sr. Manager, NetSec GTM Programs

@ Palo Alto Networks | Santa Clara, CA, United States

SOC Analyst I

@ Fortress Security Risk Management | Cleveland, OH, United States