Jan. 23, 2023, 4 p.m. | Dr Josh Stroschein

Dr Josh Stroschein www.youtube.com

Threat actors and red teams alike are always looking for, and finding, creative ways to gain initial access. Such is the case with the recent surge in the use of Microsoft OneNote files. Similar in purpose to macro-enabled office documents, OneNote files allow the embedding of scripting technology to run arbitrary commands and gives the ability to drop or download malicious programs. In this video, we'll take a look at a recent OneNote file to investigate it's structure. We'll use …

access asyncrat case documents download files initial access macro malicious malware microsoft microsoft onenote office onenote red teams run scripting teams technology threat threat actors tips video

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Offensive Security Engineer

@ Ivanti | United States, Remote

Senior Security Engineer I

@ Samsara | Remote - US

Senior Principal Information System Security Engineer

@ Chameleon Consulting Group | Herndon, VA

Junior Detections Engineer

@ Kandji | San Francisco

Data Security Engineer/ Architect - Remote United States

@ Stanley Black & Decker | Towson MD USA - 701 E Joppa Rd Bg 700