System Binary Proxy Execution: Msiexec
Course Content
*text in italic*
This course will cover the technique:
> [T1218.007](https://attack.mitre.org/techniques/T1218/011/): System Binary Proxy Execution: Msiexec. System binary proxy execution is a means of obfuscating intentionally malicious activity and utilizing system-level permissions to carry out an exploit or payload.>As you may be aware, Msiexec is a common process on a windows operating system. This course will help you identify illegitimate use cases for Msiexec and show exactly how it pertains to this raspberry robin attack cycle. For the sake of Raspberry Robin, the MSI package was automatically downloaded from the autorun file that was installed from the USB device. The MSI package plays a critical role in establishing the C2 channel the threat actor will use to execute remote commands.
Learn how to detect and mitigate these techniques to protect your organization from this type of attack. Apply what you learn and get the hands-on skills you need in Cybrary's MITRE ATT&CK Framework courses aligned to tactics and techniques used by threat actors.