Navigation : Administration Recon Malware - Windows Exploitation Post-Exploitation Malware Techniques and tactics requiring user interaction to gain initial access. Windows Office DDE Office Macro Office OLE