June 2018
Beginner to intermediate
236 pages
6h 39m
English
In recent attacks, adversaries have run arbitrary code that is executed from a Microsoft Word document without the use of any macros or scripts. This technique is a legitimate Microsoft Office functionality called Dynamic Data Exchange (DDE).
Let's try to see this attack from a cyber kill chain perceptive. The Cyber kill chain is used to describe the attack stages: