Exploiting CVE-2024-21413 Microsoft Outlook Remote Code Execution
ฝัง
- เผยแพร่เมื่อ 5 ต.ค. 2024
- This script presents a proof of concept (PoC) for CVE-2024-21413, a significant security vulnerability discovered in Microsoft Outlook with a CVSS of 9.8. Termed the #MonikerLink bug, this vulnerability has far-reaching implications, including the potential leakage of local NTLM information and the possibility of remote code execution. Moreover, it highlights an attack vector that could bypass Office Protected View, thereby extending its threat to other Office applications
Exploit link : github.com/Mdu...
tags:
#CyberSecurity
#EthicalHacking
#InfoSec
#Hacking
#PenetrationTesting
#CyberAttack
#BugBounty
#CyberAware
#CyberDefense
#VulnerabilityAssessment
#ITSecurity
Copyright Disclaimer under Section 107 of the copyright act 1976, allowance is made for fair use for purposes such as criticism, comment, news reporting, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favour of fair use.
---
This Channel is meant for educational purposes only and doesn't promote or encourage any illegal activities.
Impact of this vulnerability
As you see in the Poc the vulnerability dumps the NTLM hash and can be chained to RCE which is critical
How come the IP address the poison answer was sent to is different from the windows IP address? Windows IP ( Delloite is 192.168.233.83), the poison answer was sent to 192.168.233.254
I am using kali linux VM ware to run the exploit and in windows machine with vulnerable outlook version i tried this in same laptop …. But not able to capture hash…. 😢
Please help me
Follow the video carefully use responder to capture the hash