Abstract

Abusing Outlook Part II - Continue.

We will look at how to maintain stealthy access in the network by creating covert C2C.

How to use outlook as our detonator to execute our malicious payload.

Please check the github repo for the sample file and scripts which were used during demonstration.

https://github.com/3xpl01tc0d3r/Abusing-Outlook

Speaker

Chirag Savla

Chirag Savla is a Cyber Security professional with 9+ years of experience. His areas of interest include penetration testing, red teaming, azure and active directory security, and post-exploitation research. He prefers to create open-source tools and explore new attack methodologies in his leisure. He has worked extensively on Azure, Active Directory attacks, defense, and bypassing detection mechanisms. He is an author of multiple Open Source tools such as Process Injection, Callidus, etc. He has presented at multiple conferences and local meetups and has trained people in international conferences like Blackhat, BSides Milano, Wild West Hackin’ Fest.
He blogs at https://3xpl01tc0d3r.blogspot.com
Twitter: @chiragsavla94
Github: https://github.com/3xpl01tc0d3r

Timing

Starts at Saturday August 11 2018, 11:55 AM. The sessions runs for about 1 hour.

Resources