Abusing Outlook Part II - Continue null Mumbai Meet 11 August 2018 null Mumbai Meet 11 August 2018 null/OWASP Monthly Meet
Abusing Outlook Part II - Continue.
We will look at how to maintain stealthy access in the network by creating covert C2C.
How to use outlook as our detonator to execute our malicious payload.
Please check the github repo for the sample file and scripts which were used during demonstration.
Starts at Saturday August 11 2018, 11:55 AM. The sessions runs for about 1 hour.