(Not) All She Wrote (Part 3): Rigged RTF Documents

Hello paranoids  It seems we have reached the final post. Previously, i have addressed PDFs containing exploits and Office documents containing macros and exploits. This post will be lighter than the others since i won't be doing full analysis of documents. I have shown you before how you can analyse embedded shellcode once you have it so i … Continue reading (Not) All She Wrote (Part 3): Rigged RTF Documents

Advertisements