{"guid":"import-4e23139e8c3b0534b2","title":"Methods for Understanding Targeted Attacks with Office Documents","subtitle":null,"slug":"25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents","link":"http://events.ccc.de/congress/2008/Fahrplan/events/2938.en.html","description":"As more security features and anti-exploitation mechanisms are added to modern operating systems, attackers are changing their targets to higher-level applications. In the last few years, we have seen increasing targeted attacks using malicious Office documents against both government and non-government entities. These attacks are well publicized in the media; unfortunately, there is not much public information on attack details or exploitation mechanisms employed in the attacks themselves. This presentation aims to fill the gap by offering:\n","original_language":"eng","persons":["Bruce Dang"],"tags":["25c3"," Hacking"],"view_count":77,"promoted":false,"date":"2008-12-29T01:00:00.000+01:00","release_date":"2009-01-18T01:00:00.000+01:00","updated_at":"2023-09-10T01:45:02.062+02:00","length":3067,"duration":3067,"thumb_url":"https://static.media.ccc.de/media/congress/2008/25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.jpg","poster_url":"https://static.media.ccc.de/media/congress/2008/25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2008/import-4e23139e8c3b0534b2-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2008/import-4e23139e8c3b0534b2-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents","url":"https://api.media.ccc.de/public/events/import-4e23139e8c3b0534b2","conference_title":"25C3: nothing to hide","conference_url":"https://api.media.ccc.de/public/conferences/25c3","related":[{"event_id":563,"event_guid":"import-ef2be2cea3b7d868a1","weight":1},{"event_id":1274,"event_guid":"import-b24e96b14b74162533","weight":1},{"event_id":1341,"event_guid":"import-a8f4cba930451edf37","weight":1}],"recordings":[{"size":392,"length":3067,"mime_type":"audio/ogg","language":"eng","filename":"25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.ogg","state":"downloaded","folder":"audio_only","high_quality":true,"width":720,"height":576,"updated_at":"2014-05-10T15:26:46.401+02:00","recording_url":"https://cdn.media.ccc.de/congress/2008/audio_only/25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.ogg","url":"https://api.media.ccc.de/public/recordings/2300","event_url":"https://api.media.ccc.de/public/events/import-4e23139e8c3b0534b2","conference_url":"https://api.media.ccc.de/public/conferences/25c3"},{"size":392,"length":3067,"mime_type":"video/mp4","language":"eng","filename":"25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.mp4","state":"downloaded","folder":"video_h264_720x576","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:33.224+01:00","recording_url":"https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.mp4","url":"https://api.media.ccc.de/public/recordings/2299","event_url":"https://api.media.ccc.de/public/events/import-4e23139e8c3b0534b2","conference_url":"https://api.media.ccc.de/public/conferences/25c3"},{"size":392,"length":3067,"mime_type":"video/webm","language":"eng","filename":"25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.webm","state":"downloaded","folder":"webm","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:33.261+01:00","recording_url":"https://cdn.media.ccc.de/congress/2008/webm/25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.webm","url":"https://api.media.ccc.de/public/recordings/2298","event_url":"https://api.media.ccc.de/public/events/import-4e23139e8c3b0534b2","conference_url":"https://api.media.ccc.de/public/conferences/25c3"}]}