If you knew how many ways you could obfuscate and deliver payloads with RTF documents, you would have thought it was a file format Microsoft secretively purchased from Adobe. Kidding aside, 2016 has peeked my interest in the RTF specification and you should learn why. This talk walks through research experiences and examples that take advantage of the RTF specification and address these three areas: exploitation, evasion and counter measures.
Audience members can expect to gain a technical understanding of the following: