وحدة 9
Malicious document analysis
آخر تحديث في: 23 أغسطس 2024
تعديل هذه الصفحة على GitHubوحدة 9
آخر تحديث في: 23 أغسطس 2024
تعديل هذه الصفحة على GitHubWhile many people know to be suspicious of executable binary files, office document formats such as PDF, DOC, DOCX, XLSX, and ODT, which are used on a daily basis, are unfortunately known to be weaponized with malicious dynamic content or application exploits.
This subtopic teaches learners how they can triage and analyze potentially malicious documents.
After completing this subtopic, practitioners should be able to do the following:
Many threat actors can use documents with malicious payloads as an attack vector. Read through this page for a case study thereof.
Greater Internet Freedom, an Internews Project, recently created a small course on analyzing malicious documents. Read through all four parts of the course (listed below) in order to complete this subtopic.
Please note that some of the tools included in this guide require Python to be installed on your system. MacOS and Linux systems may have Python installed by default. If you are running Windows, we recommend setting up WSL (Windows Subsystem for Linux) and running the tools from there.
Part 1 - Introduction and VMs - Internews Greater Internet Freedom
Part 2 - PDF Documents
Part 3 - Microsoft Office Documents
Part 4 - Defensive Measures and Next Steps
Complete all of the challenges in the course linked above.
Analysis of malicious documents – Part 01 – Introduction and VMs
FreeIntroduces the topic of malicious document analysis and guides learners on setting up a VM for the task.
Analysis of malicious documents – Part 02 – PDF documents
FreeCovers tools like text editors and PDF disassemblers for analyzing PDF files and detecting executable scripts.
Analysis of malicious documents – Part 03 – Microsoft Office documents
FreeExplores the structure of Microsoft Office documents and their potential for embedding active content.
Analysis of malicious documents – Part 04 – Defensive measures, next steps, and closure
FreeDemonstrates steps and defensive measures when handling documents from unknown or potentially malicious sources.
Analyzing malicious PDFs
FreeDiscusses various tools for in-depth analysis of malicious PDF files.
How to analyze malicious Microsoft Office files
FreeProvides insights into detecting malicious payloads in Microsoft Office files and methods for analysis.
تهانينا على انتهاء وحدة 9!
وسم المربع لتأكيد اكتمالك والمتابعة إلى الوحدة التالية.
يوسم الوحدة الحالية كمكتملة ويحفظ التقدم للمستخدم.
لقد أكملت جميع الوحدات في مسار التعلم هذا.