System Binary Proxy Execution: Msiexec
In the course, you will learn how a malicious user can obfuscate some of their payload actions through downloaded DLL files by utilizing the built in rundll32.exe. By using rundll32, an attacker can make their activity look like a normal Windows system binary process being executed under the rundll32.
Course Description
text in italic
### This course will cover the technique:
Learn how to detect and mitigate these techniques to protect your organization from this type of attack. Apply what you learn and get the hands-on skills you need in Cybrary’s MITRE ATT&CK Framework courses aligned to tactics and techniques used by threat actors.
Learn how to detect and mitigate these techniques to protect your organization from this type of attack. Apply what you learn and get the hands-on skills you need in Cybrary’s MITRE ATT&CK Framework courses aligned to tactics and techniques used by threat actors.
Module 1: Introduction
Module 2: What is Technique T1218.007?
User Reviews
Be the first to review “System Binary Proxy Execution: Msiexec”
You must be logged in to post a review.


There are no reviews yet.