Article: Hunting COM Objects - published over 5 years ago. Content: COM objects have recently been used by penetration testers, Red Teams, and malicious actors to perform lateral movement. COM objects were studied by several other researchers in the past, including Matt Nelson (enigma0x3), who published a blog post about it in 2017. Some of these COM objects were also added to the Empire project. To improve the R... http://www.fireeye.com/blog/threat-research/2019/06/hunting-com-objects.html Published: 2019 06 04 14:45:00 Received: 2021 11 03 23:00:22 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Click to Open Code Editor