Microsoft Office security, part two | |
From: | Joe Klemmer |
Date: | Wed, 30 Aug 2006 16:41:19 -0400 |
Microsoft Office security, part two By Khushbu Jithra This article discusses Microsoft Office's OLE Structured Storage and the nature of recent dropper programs and other exploit agents, in an effort to scrutinize the workings of some of the recent MS Office exploits. Part two will then collates some forensic investigation avenues through different MS Office features. Parts of the article sample different MS Office vulnerabilities to discuss their nature and the method of exploitation. http://www.securityfocus.com/infocus/1874