Dissecting a Highly Obfuscated RTF Exploit
Ever wondered how a simple RTF document can completely compromise a system? Let's tear apart a real-world, obfuscated CVE-2017-11882 exploit that uses dynamic encryption, shellcode obfuscation, and some seriously clever evasion techniques to deliver its payload.
Read more