Extra Credits I: COM Objects Attacking & Detecting
Happy new year! Outside of the bread and butter of the DFIR of Windows, I haven't over explored what I'd deem more niche or old but tried and tested concepts that I believe are sometimes overlooked, so I've set out to research, test and share some findings; with this being the first. This is in no means an attempt to deep-dive, but enough for a logical understanding to explore further, or hopefully help detect and respond to exploitation of such features/protocols. If you have any comments/additions or disagreements, I'm very open to discussion and to learn. Windows Component Object Model (COM) If you are not interested in reading a summary on what COM actually is, or how it works skip to section " The "Offensive" Approach (How Hackers abuse COM Objects) " where an initial summary of attacks, followed by a demo and some topics on detection and response can be seen. Windows Component Object Model (COM) in a simple term is a plug and play utility p...