Microsoft Office for Post-Exploitation and Persistence
Microsoft Office products are so popular that it is found from basically every workplace. The Office products such as Word, Excel and PowerPoint are needed tools in many fields as these tools are packed with different functionalities. The wide use of the Office products makes them an interesting attack vector for an attacker to exploit […]