![]() This should obviously only ever be done on computers you own or have express permission to attack. Programs exist to do this online but I will be doing it manually. hta files as droppers in order to import and execute malicious files onto a system. This is by no means a new tactic but it is something I had didn’t usually look at too much so decided to have an explore. When looking at this article I was reading about a spearfishing campaign conducted by APT41 using compressed HTML files (.chm). ![]() I like to read articles of current tactics used by Advanced Persistent Threat (APT) Groups. This one won’t be a htb write up though more a summary of a recent bit of study I undertook. Now I have internet again I can catch up with the postings I have missed over the last few weeks.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |