Understanding PrintNightmare Vulnerability | (CVE-2021-1675) and (CVE-2021-34527) TryHackMe

แชร์
ฝัง
  • เผยแพร่เมื่อ 24 ม.ค. 2025

ความคิดเห็น • 5

  • @extremoleste8310
    @extremoleste8310 2 ปีที่แล้ว

    The best ctf channel in the world
    And please do more CTFs on hard level 🙏🙏🙏🙏

  • @rationalbushcraft
    @rationalbushcraft 2 ปีที่แล้ว

    Love your videos they always introduce me to something I had not seen before. On the attack box if you look in the upper right corner the IP of the box is there so you don't have to keep doing ifconfig. Also I always add the target IP to the host file and call it target.thm so I don't have to remember that ip.

  • @EchoTheTechDude
    @EchoTheTechDude 2 ปีที่แล้ว

    PrintNightmare is probly one of my favorite vulnerability's out there next to external blue exploit

  • @jdp2926
    @jdp2926 2 ปีที่แล้ว

    where is the Indicator of Compromise video? :(

  • @Battleneter
    @Battleneter 2 ปีที่แล้ว

    So really these attacks require network access, either LAN, VPN or Citrix etc. If the actor does not have access to your network and is hitting a effective firewall as you would expect in large organizations, this vulnerability is not technically a threat, is that correct?