Love your videos they always introduce me to something I had not seen before. On the attack box if you look in the upper right corner the IP of the box is there so you don't have to keep doing ifconfig. Also I always add the target IP to the host file and call it target.thm so I don't have to remember that ip.
So really these attacks require network access, either LAN, VPN or Citrix etc. If the actor does not have access to your network and is hitting a effective firewall as you would expect in large organizations, this vulnerability is not technically a threat, is that correct?
The best ctf channel in the world
And please do more CTFs on hard level 🙏🙏🙏🙏
Love your videos they always introduce me to something I had not seen before. On the attack box if you look in the upper right corner the IP of the box is there so you don't have to keep doing ifconfig. Also I always add the target IP to the host file and call it target.thm so I don't have to remember that ip.
PrintNightmare is probly one of my favorite vulnerability's out there next to external blue exploit
where is the Indicator of Compromise video? :(
So really these attacks require network access, either LAN, VPN or Citrix etc. If the actor does not have access to your network and is hitting a effective firewall as you would expect in large organizations, this vulnerability is not technically a threat, is that correct?