1 00:00:00,480 --> 00:00:07,620 Hello and welcome to a new section, this section, you are going to do that exercise on your own and 2 00:00:07,620 --> 00:00:14,760 this video will give you the instructions intro to the exercise, and that is the Microsoft Office document. 3 00:00:17,780 --> 00:00:26,330 Earlier, we had already analyzed PDF file, also an important update, and extracted a document file 4 00:00:26,480 --> 00:00:33,350 and call it rogatory, if you have misplaced it, kindly download from the resource section for this 5 00:00:33,350 --> 00:00:33,770 lesson. 6 00:00:34,730 --> 00:00:40,490 You can use 7C or any other Anzhi program to unzip the password. 7 00:00:40,850 --> 00:00:42,920 Cracking lessons dot com. 8 00:00:44,920 --> 00:00:52,300 Your instructions are as follows, analyzed the office document, look for attacks or macros within 9 00:00:52,300 --> 00:01:00,270 the document, determine what the malware does, looking for indicators of compromise like strings, 10 00:01:00,300 --> 00:01:02,540 your L's filenames and so on. 11 00:01:03,220 --> 00:01:08,380 Try this on your own first before you viewed true in the upcoming videos. 12 00:01:09,160 --> 00:01:09,550 Gallah. 13 00:01:10,030 --> 00:01:10,960 Thank you for watching. 14 00:01:11,410 --> 00:01:12,550 How severe the next one.