References

Type
Url
Description

technique

https://sensepost.com/blog/2017/macro-less-code-exec-in-msword/

Stalmans, E., El-Sherei, S. (2017, October 9). Macro-less Code Exec in MSWord. Retrieved November 21, 2017.


technique

https://sensepost.com/blog/2016/powershell-c-sharp-and-dde-the-power-within/

El-Sherei, S. (2016, May 20). PowerShell, C-Sharp and DDE The Power Within. Retrieved November 22, 2017.


technique

https://attack.mitre.org/techniques/T1559/002


technique

https://attack.mitre.org/techniques/T1204/002


technique

https://threatpost.com/broadvoice-leaks-350m-records-voicemail-transcripts/160158/

Seals, T. (2020, October 15). Broadvoice Leak Exposes 350M Records, Personal Voicemail Transcripts. Retrieved October 20, 2020.


technique

https://attack.mitre.org/techniques/T1591/003


technique

https://attack.mitre.org/techniques/T1063


technique

https://cybersecurity.att.com/blogs/labs-research/scanbox-a-reconnaissance-framework-used-on-waterin

Blasco, J. (2014, August 28). Scanbox: A Reconnaissance Framework Used with Watering Hole Attacks. Retrieved October 19, 2020.


technique

https://attack.mitre.org/techniques/T1592/001


technique

https://rewtin.blogspot.ch/2017/11/abusing-user-shares-for-efficient.html

Routin, D. (2017, November 13). Abusing network shares for efficient lateral movements and privesc (DirSharePivot). Retrieved April 12, 2018.