Subscribe to Blog via Email

Categories

Archives

Red Teaming

Red Teaming

Windows Exploitation: mshta

Today we are going to learn about different methods of HTA attack. HTA is a useful and important attack because it can bypass application whitelisting.