technique
https://sensepost.com/blog/2017/macro-less-code-exec-in-msword/
Stalmans, E., El-Sherei, S. (2017, October 9). Macro-less Code Exec in MSWord. Retrieved November 21, 2017.
technique
https://sensepost.com/blog/2016/powershell-c-sharp-and-dde-the-power-within/
El-Sherei, S. (2016, May 20). PowerShell, C-Sharp and DDE The Power Within. Retrieved November 22, 2017.
technique
https://attack.mitre.org/techniques/T1559/002
technique
https://attack.mitre.org/techniques/T1204/002
technique
https://threatpost.com/broadvoice-leaks-350m-records-voicemail-transcripts/160158/
Seals, T. (2020, October 15). Broadvoice Leak Exposes 350M Records, Personal Voicemail Transcripts. Retrieved October 20, 2020.
technique
https://attack.mitre.org/techniques/T1591/003
technique
https://attack.mitre.org/techniques/T1063
technique
https://cybersecurity.att.com/blogs/labs-research/scanbox-a-reconnaissance-framework-used-on-waterin
Blasco, J. (2014, August 28). Scanbox: A Reconnaissance Framework Used with Watering Hole Attacks. Retrieved October 19, 2020.
technique
https://attack.mitre.org/techniques/T1592/001
technique
https://rewtin.blogspot.ch/2017/11/abusing-user-shares-for-efficient.html
Routin, D. (2017, November 13). Abusing network shares for efficient lateral movements and privesc (DirSharePivot). Retrieved April 12, 2018.