In order to gain initial access as part of a red team exercise, phishing is a very popular approach. A convincing scenario must be found to entice the targets to download and run the malicious file on their laptop. Using a Word document with a macro that launches the malware is a good way to create a legitimate scenario and build target confidence. However, it is necessary to work ahead of time on the macro to avoid defensive measures. For the following, we will choose to target an up-to-date Windows 10 version with all default settings. We will then see what we need to do for our macro to be recognized as legitimate.
- Home
- About Us
- Meet Success
About us
Our expert team knows how to anticipate, collaborate, and innovate.
About feature 2Career Opportunities
Work with leaders in your field to develop insight, experience and truly add value.
About feature 1Get in Touch
5 rue Goell L-5326 Contern Luxembourg.
+352 26 20 39 64
Mon-Fri, 6am until 10pmcontact@excellium-services.com
Contact feature
- Services
- Security advisory
- Blog
- Contact Us
- Emergency
Skip to content
- Home
- About Us
- Meet Success
About us
Our expert team knows how to anticipate, collaborate, and innovate.
About feature 2Career Opportunities
Work with leaders in your field to develop insight, experience and truly add value.
About feature 1Get in Touch
5 rue Goell L-5326 Contern Luxembourg.
+352 26 20 39 64
Mon-Fri, 6am until 10pmcontact@excellium-services.com
Contact feature
- Services
- Security advisory
- Blog
- Contact Us
- Emergency