Exploiting CVE-2024-21413 Microsoft Outlook Remote Code Execution

แชร์
ฝัง
  • เผยแพร่เมื่อ 5 ต.ค. 2024
  • This script presents a proof of concept (PoC) for CVE-2024-21413, a significant security vulnerability discovered in Microsoft Outlook with a CVSS of 9.8. Termed the #MonikerLink bug, this vulnerability has far-reaching implications, including the potential leakage of local NTLM information and the possibility of remote code execution. Moreover, it highlights an attack vector that could bypass Office Protected View, thereby extending its threat to other Office applications
    Exploit link : github.com/Mdu...
    tags:
    #CyberSecurity
    #EthicalHacking
    #InfoSec
    #Hacking
    #PenetrationTesting
    #CyberAttack
    #BugBounty
    #CyberAware
    #CyberDefense
    #VulnerabilityAssessment
    #ITSecurity
    Copyright Disclaimer under Section 107 of the copyright act 1976, allowance is made for fair use for purposes such as criticism, comment, news reporting, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favour of fair use.
    ---
    This Channel is meant for educational purposes only and doesn't promote or encourage any illegal activities.

ความคิดเห็น • 5

  • @jyothikiran1558
    @jyothikiran1558 7 หลายเดือนก่อน

    Impact of this vulnerability

    • @Thecybermonkey
      @Thecybermonkey  7 หลายเดือนก่อน

      As you see in the Poc the vulnerability dumps the NTLM hash and can be chained to RCE which is critical

  • @m9k9veliii
    @m9k9veliii 2 หลายเดือนก่อน

    How come the IP address the poison answer was sent to is different from the windows IP address? Windows IP ( Delloite is 192.168.233.83), the poison answer was sent to 192.168.233.254

  • @kartheekkandalam2274
    @kartheekkandalam2274 6 หลายเดือนก่อน

    I am using kali linux VM ware to run the exploit and in windows machine with vulnerable outlook version i tried this in same laptop …. But not able to capture hash…. 😢
    Please help me

    • @Thecybermonkey
      @Thecybermonkey  5 หลายเดือนก่อน

      Follow the video carefully use responder to capture the hash