let’s play with a ZERO-DAY vulnerability “follina”

Поделиться
HTML-код
  • Опубликовано: 11 сен 2024

Комментарии • 617

  • @NetworkChuck
    @NetworkChuck  2 года назад +124

    Want to become a HACKER? ITProTV has you covered: ntck.co/itprotv (30% off FOREVER) *affiliate link
    🧪🧪Try it yourself!! (Links, docs, and walkthrough): ntck.co/follinalinks
    SPECIAL THANKS to John Hammond (go check him out!!)
    ---------------------------------------------------
    -RUclips: ruclips.net/user/JohnHammond010
    -Twitter: twitter.com/_JohnHammond
    -his amazing article on Follina: www.huntress.com/blog/microsoft-office-remote-code-execution-follina-msdt-bug
    🔥🔥Join the NetworkChuck Academy!: ntck.co/NCAcademy
    **Sponsored by ITProTV
    0:00 ⏩ Intro
    1:58 ⏩ How does CVE-2022-30190 work??
    6:33 ⏩ What happens when you open the file?
    9:23 ⏩ Let’s set up our zero-day vulnerability lab!
    17:29 ⏩Time to test the Malware!
    20:00 ⏩ Outro

    • @SrModeration
      @SrModeration 2 года назад

      Omg, your hair looks extremely good today. I like the side parting 🙀❤️
      Ohh, and a Big thanks for your Videos. I Watched Them *all* ❤️🌹~

    • @SrModeration
      @SrModeration 2 года назад

      could it be that you got the t-shirt for father's day? xD if so, then that was a cool idea of ​​theirs

    • @passaronegro349
      @passaronegro349 2 года назад

      we follow your work in Brazil 🇧🇷✨ .this encourages me !! thank you brother.

    • @fxylk
      @fxylk 2 года назад

      Love the way you talk 🥰

    • @5eda
      @5eda 2 года назад

      you typed mcd

  • @andyh3970
    @andyh3970 2 года назад +78

    Thanks for keeping the “mistakes” in the video. It reinforces the information sooo much better !

  • @_JohnHammond
    @_JohnHammond 2 года назад +1097

    HUGE thanks for letting me come crash the party, NetworkChuck!! Looking forward to all the crazy cool stuff we can do in the future 😎

    • @NetworkChuck
      @NetworkChuck  2 года назад +73

      Ooohhhhh yeaaaaah

    • @Jarnoz
      @Jarnoz 2 года назад +2

      hi

    • @savagepro9060
      @savagepro9060 2 года назад +11

      I was so scared to 'click' this thread😰

    • @patrickdee7365
      @patrickdee7365 2 года назад +1

      fast video on this hot topic, gj

    • @_AN203
      @_AN203 2 года назад

      Hello there !!

  • @marcfer5481
    @marcfer5481 2 года назад +61

    It was amazing seeing Chuck test a real vunerability, this could be a very interesting series on your channel!

  • @gamereditor59ner22
    @gamereditor59ner22 2 года назад +135

    Zero-day vulnerability is scary and should be consider to learn with caution. Thank you for the information and keep it up!

    • @axa897
      @axa897 2 года назад +5

      Its not scary do not open any files from email and you 100% safe 🤷😂

    • @smashulica
      @smashulica 2 года назад +2

      Do not open .docx or .doc anymore that's it.
      Use a trial vps instead to open if you really need to see what's inside document.

    • @FatCatMaht
      @FatCatMaht 2 года назад

      @Hòmè Ďeçoŕè hmmmmmmmmm

    • @MultiBannanaSHITTTT
      @MultiBannanaSHITTTT 6 месяцев назад

      @@axa897That’s true for this one. But there are 0click 0days out in the wild too. Take for example the pegasus spyware that got installed by just your phone receiving a message/gif and you not doing anything with it.

  • @mrnobodyatallnoneed
    @mrnobodyatallnoneed 2 года назад +41

    As an ethical hacker in making, I really appreciated this video, very informative as always, thanks, Chuck!

    • @timeismore7239
      @timeismore7239 2 года назад +1

      Can you please hack my old inactive instagram account?

    • @Enlightened.
      @Enlightened. 2 года назад

      Hello there. I hope I am not intruding on your busy schedule. I was just wondering if you knew whether someone found a fix to this that doesn't involve the removal of the new text file option? I followed the official guide to fix it and I just reversed it back to before the fix because I can't bear having to open notepad to created a text file.

    • @rian0xFFF
      @rian0xFFF 2 года назад +2

      @@timeismore7239 Hahaha you think that easy?

  • @kronedog
    @kronedog 2 года назад +9

    Thank you Network Chuck for making this video so quickly and of course thanks to John Hammond. I followed along and indeed was fun to play around with.

  • @gregatit
    @gregatit 2 года назад +51

    As a middle aged bearded geek going through A+ cert after years of computer nerdery, your videos always ring true to what I seem to be learning at any moment be it bash, be it ip sucking at subnetting or zero day exploits…Chuck you are tuned in to what so many delicious topics! Thanks for being our coffee! ☕️

    • @clorets4509
      @clorets4509 3 месяца назад

      yoooooo, where did you reach now ? have you passed A+?

    • @gregatit
      @gregatit 3 месяца назад

      I sure did. To date I have my A+, Net+, Sec+, Server+, Cloud+, LPI and am working on my CYSA+ and am lucky enough to be teaching entry level cybersecurity classes in workforce development.

    • @clorets4509
      @clorets4509 3 месяца назад +1

      @@gregatit daaaaaaamnnn bro

  • @Kevinmulhalljr
    @Kevinmulhalljr 2 года назад +14

    Definitely would like to see more of these type of videos. As a user of the 365 support and recovery tool for troubleshooting tenant issues I’m wondering how vulnerable the program is to being exploited, especially not knowing how superficial endpoint scanning is…

  • @keithcooper9087
    @keithcooper9087 2 года назад +11

    Very interesting video. I've been playing with python for the last 5 or 6 months, but never knew you could make a webserver like that. Great content!!!

  • @jasonholtham2348
    @jasonholtham2348 2 года назад +10

    Thank you for this video, relateable content as im in the cyber security field. Would definatly be intersted in more content like this.

  • @gerardest721
    @gerardest721 2 года назад +7

    Chuck definitely do more stuff like that!!

  • @carltonbanks194
    @carltonbanks194 Год назад

    12:53 was expecting him to say to take another coffee break lolol

  • @mikalichou
    @mikalichou 2 года назад +3

    Man, after months of "20mn video to explain if/else" it's really really nice to see again full power highly caffeinated Chuck

  • @cleightthejw2202
    @cleightthejw2202 2 года назад +5

    @NetWorkChuck
    Yes, you should keep doing vids like this. The good thing to this would be your growing along the way AND bringing others with you as they learn these things too!

  • @MarkusMaal
    @MarkusMaal 2 года назад +5

    Microsoft be like: it’s not a bug, it’s a feature

  • @JemilMarcosTyC
    @JemilMarcosTyC 2 года назад +4

    Awesome!!! Tnx for the demo! Btw, gotta love that bash prompt, can you share the code so I can paste it in my .bashrc?

    • @MRetoastet
      @MRetoastet 2 года назад +1

      It's the standard kali linux prompt. Could be powerline10k

  • @Asherstitusworld
    @Asherstitusworld 2 года назад +5

    Super Video Chuck Your videos are awesome And informative

  • @djscuffedjays5155
    @djscuffedjays5155 2 года назад +1

    Amazing collab! Been following both of you for a while, awesome to see!

  • @WJPearce_
    @WJPearce_ 2 года назад +2

    Amazing video Chuck. More content like this please dude

  • @steps0x029a
    @steps0x029a 2 года назад +2

    Windows Defender seems to have caught up with Follina. Word still reaches out to the server, but that's it. You get a warning and nothing else is happening - at least with my setup, don't feel too safe. I really like the idea of Chuck and John making content as a team, by the way!

    • @MrSpyLiam
      @MrSpyLiam 2 года назад +1

      It depends on what you do with Folina. Hackers are experts in remaining undetected. What Chuck shows you is a very basic attack, but in real life instances victims wouldn't know that anything has been done, other than that they open a Microsoft product and the troubleshooting window runs.

    • @steps0x029a
      @steps0x029a 2 года назад

      @@MrSpyLiamof course. But as Defender seems to actually prevent the execution, it shouldn't really matter what payload is used. I might be wrong, though 🤷🏻‍♂️

  • @ChristianPixtun
    @ChristianPixtun 2 года назад

    You should really do a playlist explaining these vulnerabilities.
    Yes, there are channels explaining this stuff, but with you and your way of teaching things, explaining a CVE and how it works is a must for security professionals, especially if they want to be blue or red team pros, or even us, who are just passionate of these things.
    Do a playlist!!!!!!

  • @Bjon10
    @Bjon10 2 года назад +2

    Networkchuck & John Hammond content love to see that! Thank you chuck for the great content

  • @benarmy22
    @benarmy22 2 года назад +1

    Everytime I watch one of your videos about Linux I learn something new and want to learn more. Great video.

  • @twcziggybomz187
    @twcziggybomz187 2 года назад +4

    Hey Chuck , ive actually come across the exact same thing yesterday except it wasnt a word document. It was a whole installation ISO of Windows 11 Pro , which my brother downloaded from the Pirate Bay. it triggered instantly once the installation was completed , and had some more effects to it whereby it damaged hardware so bad that the bios was messed up as well.

    • @AnotherSkyTV
      @AnotherSkyTV 2 года назад

      You mean it ran this diagnostic tool window once installation was finished?

    • @twcziggybomz187
      @twcziggybomz187 2 года назад

      @@AnotherSkyTV yes once instalation was finished , pc rebooted , once signed in diagostic popped up

    • @moth5799
      @moth5799 2 года назад +1

      An ISO that you use at boot has basically full access to your system, not a good idea to download that from a pirate site without checking it in a VM first at least, msdt is the least of your issues when it comes to that lmao

  • @theaifam5
    @theaifam5 2 года назад

    34 is not a “weird obfuscation” but just “ required so the Base64 receives payload string and decodes it and executes it, like a normal function call where the argument is a string, in this case, a base64 encoded payload

  • @abdallahnimer9868
    @abdallahnimer9868 2 года назад +1

    More of these videos please!

  • @guilhermenocera739
    @guilhermenocera739 2 года назад +1

    Hey Chuck! What is inside that coffee, man? Your voice speed in that video was like 3.5X already!

  • @gammer80
    @gammer80 2 года назад +1

    Thanks for you work
    I love it. Tested it out and got it working.
    I wonder if the company I work for would have to worry about this. Sure they have it blocked already but you never know. Company is world wide

  • @youneskarmouche8960
    @youneskarmouche8960 2 года назад

    Man I just can hear you talking for hours 😂
    I'm french but I just so easily understand what you say without paying attention. I admire your eloquence buddy 👏😎

  • @the1observer
    @the1observer 2 года назад

    Jyst came across his channel, nobody warned me that the Vikings lineage was still going strong. What an evolution path, from raiding to coding.
    Love the facial hair here, just kidding around. You look like a character in Vikings late seasons, the brother of a King if I recall correctly but his name I can't say.
    Cheers

  • @plousho1947
    @plousho1947 2 года назад

    its really awesome that this video references what you learn in the Hack the box course.

  • @toqq298
    @toqq298 2 года назад

    Mr. Chuck, i've been following u since 2020 bro. Im so glad i followed u all this years, u make me clear of my path, my careers. All i just want to say is thank you. Keep on what ur doing, if my god wills it, i keep on supporting ur content bro, ( muslim from malaysia ) 😁😁

  • @meercat1880
    @meercat1880 2 года назад

    2 of my favorite youtubers looking at one of my favorite zero days

  • @wellsilver3972
    @wellsilver3972 2 года назад +1

    I think the most people became aware by microsoft's post on how to fix it by just like 2 command line things

  • @salvatorenappi2711
    @salvatorenappi2711 2 года назад +1

    I'm in love with this videos. I'm 16 and videos like this inspire me in hacking hobby. ❤️‍🔥

  • @itsandroler6996
    @itsandroler6996 2 года назад +1

    hey I here (am 14) quit Linux like 4-5 months ago as i wasn't able to understand anything. but then i came across you tutorials (Kali for beginners) and now you gain 1 sub, and like to each video. thanks for helping man you are awesome. keep it up

  • @lancemarchetti8673
    @lancemarchetti8673 2 года назад

    Always loved the fascinating coding style of Zer0-Day since the mid 90's.

  • @sinaan2181
    @sinaan2181 2 года назад

    I'am too much happy to look at the face of people who talk about vulnerabilities in open source softwares. I'am very very very much happy to know about this zero day vulnerability.

  • @Cochise85
    @Cochise85 2 года назад

    Great stuff. Next time, ease up on the coffee a bit - it was making you hyper and jittery ... but very effective

  • @ando1gy6hgcghh
    @ando1gy6hgcghh 2 года назад +22

    This entire day, I see this vulnerability everywhere lol 😂😂
    Btw, this vulnerability works just on few versions of Office.

    • @cobalt-snake6125
      @cobalt-snake6125 2 года назад

      Which versions of Office are affected?

    • @ando1gy6hgcghh
      @ando1gy6hgcghh 2 года назад

      @@cobalt-snake6125 365, 2017 - 2019 I think

    • @taahaseois.8898
      @taahaseois.8898 2 года назад +5

      If it is in RTF format, you don't have to open it.

    • @ando1gy6hgcghh
      @ando1gy6hgcghh 2 года назад +2

      @@taahaseois.8898 Yup, that's right

    • @Adthin
      @Adthin 2 года назад +3

      @@cobalt-snake6125 the latest one is. don't know about the rest, also I'm pretty sure microsoft said they aren't going to fix it

  • @mtech1961
    @mtech1961 2 года назад

    I often wonder if you record your Voice and Video at Normal speed and then speed it up before uploading? If not Kudos to you, pretty amazing.

  • @StephenCurry-nm7io
    @StephenCurry-nm7io 9 месяцев назад

    In essence, exploits of Follina involve a Word document containing a web link to an attacker-controlled web resource. Since Word automatically fetches such embedded links, the attacker may specially crafting their content such that it invokes a MSDT instance which may be used to force the execution of attacker-supplied Powershell commands. However, you failed to mention that Follina may be exploited in a zero-click fashion using a file in an .rtf format which runs the code via the Preview Tab in Explorer.

  • @Digithaiz
    @Digithaiz 2 года назад +1

    Love watching these thanks Chuck and John for sharing! Legends!

  • @accesser
    @accesser 2 года назад +1

    SOE Engineer, Stuff like this makes my team busy, pushing our the reg hack fix to 4,000 devices to try and mitigate this along side reporting status updates to management fun times

  • @MrJjboyz420
    @MrJjboyz420 2 года назад

    Thank you so much for this I have been waiting someone to do videos like this!

  • @Abdullah-vp2tl
    @Abdullah-vp2tl 2 года назад

    To be honest I am someone how doesn't have an interest in hacking but youtube keeps suggesting your videos which are really fun to watch 🙃

  • @objectiveSquid
    @objectiveSquid 2 года назад +1

    Imma send this to my friends and add something saucy to their browser history file lol

  • @danielkristiansen4872
    @danielkristiansen4872 2 года назад

    Great video as always and love too see John here aswell! I Followed you along was going to download the follina.doc from python webserver on the windows box, but windows defender deleted it and detected virus. So that is atleast a good thing, looks like Im a bit late to the party !

  • @Lampe2020
    @Lampe2020 2 года назад +2

    12:18 Saying: "CMD", typing: "mcd"...
    13:47 You call the file manager in Kali (I don't know exatly which is installed there...) "Explorer or whatever" and then call the *M$ Windows Explorer* "Finder" (which is the iMac's file manager)...
    Nice video!

  • @KaySwiss21
    @KaySwiss21 2 года назад

    Vulnerability vids are top notch

  • @internetparrot9753
    @internetparrot9753 2 года назад

    I'm 12 and learn so much from this channel. Thanks!

  • @unicycle227
    @unicycle227 2 года назад

    Defo a cool video, great to see first hand in a really easy flowing way how to create a lab like this.

  • @CZghost
    @CZghost 2 года назад

    The intro kind of got me thinking - I can rickroll my friends with this and at the same time teach them about the Follina :D

  • @nicolaithune
    @nicolaithune 2 года назад

    Super interesting!
    I don't know if any solution has been found yet. If anyone is interested , there is properly some workarounds, but the one I know about is to disable 'MSDT URL Protocol'.
    Always amazing to see which ways hackers are getting into people's systems.
    Thanks for another great video Chuck!

    • @Mainstayjay
      @Mainstayjay 2 года назад

      this is what I did through cmd.

    • @godsman271
      @godsman271 2 года назад +1

      @@Mainstayjay I just wrote an batch file for doing this, also included a way to back up the registery key that must be "deleted" so i can restore it when this has been patched.

    • @Mainstayjay
      @Mainstayjay 2 года назад

      @@godsman271 you fancy man you. Very cool!

  • @12fishcake
    @12fishcake Год назад

    Always make sure to follow instructions correctly, coffee breaks at the correct times are absolutely critical

  • @michaelmalinowski2360
    @michaelmalinowski2360 2 года назад

    Love John Hammonds content and yourself and would love to see more collabs

  • @petergplus6667
    @petergplus6667 2 года назад +3

    I feel like this had probably been in the wild since years, this is so simple. Frightening.

  • @RicardoPenders
    @RicardoPenders 2 года назад +1

    I've got a fix for it, just remove the registry key "Computer\HKEY_CLASSES_ROOT\ms-msdt" completely and you're done, make a backup of the key before you remove the key.
    When the registry key is removed there's no way someone can remote control your computer using msdt.exe.
    I got this information from Dave Plummer, he's a retired Microsoft Operating Systems Engineer so he knows what he's talking about, here's a link to his video where he explains it all in detail: ruclips.net/video/gmP8AtmVr0o/видео.html

  • @cyberdevil657
    @cyberdevil657 2 года назад

    Whoa chuck this is aswome you show us this!

  • @spiffokon4295
    @spiffokon4295 2 года назад

    Chuck, Honestly this is really spooky. I don't have a laptop so am using termux on my Android and in termux you'll have to use the --command or -c all at once and you'll have to specify your interface or use the default... Tried it at work and it worked.... Honestly its spooky

  • @dragonfireproductions790
    @dragonfireproductions790 2 года назад +1

    This issue was found years ago. I was scared sharing about it because the laws in my country are ass. Cybersec researchers get arrested for reporting vulnerability

  • @JustADragon
    @JustADragon 2 года назад

    In well preped .rtf you don't even need user interaction. The preview of .rtf in windows explorer is enough. Maybe event outlook preview of .rtf file attachment - not sure rn.

  • @pierrejeppsson4674
    @pierrejeppsson4674 2 года назад

    Opatch just released an unofficial patch that doesnt disable the MSDT URL protocol handler, and instead sanitizes the user-provided path. It’s free if you register an Opatch account.

  • @mikealuspol5819
    @mikealuspol5819 2 года назад

    Nice Video NetworkChuck, thanks for the information and i think that you can disable the msdt with a registry key so we can be more safe.

  • @matteocassino3172
    @matteocassino3172 2 года назад

    Also interesting stuff besides follina: python web server and adding a NAT network in VirtualBox on-the-fly. Got it running. Thx a lot!

  • @patrickhallermann3844
    @patrickhallermann3844 2 года назад

    Really great video. I loved how you showed troubleshooting and set up that Python web server to share that file. Great content as always.

  • @AirmanKolberg
    @AirmanKolberg 2 года назад +1

    Watching you re-size the Terminal Emulator gave me chills. :o Anonymity 101: Don’t resize your terminal windows, that’s another unique identifier.

  • @ejharrop1416
    @ejharrop1416 2 года назад

    RUclipsr Dave Plummer posted a registry deletion to prevent the word doc hack. Do you agree? Thanks, enjoyed watching you work at light speed. Cheers

  • @wonkywonky6307
    @wonkywonky6307 2 года назад

    Yoo, a collab with John! Amazing video, congrats.

  • @drewzilla1263
    @drewzilla1263 2 года назад

    VERY interesting! Please do more videos like this!

  • @thesultan1212
    @thesultan1212 2 года назад +1

    this content is amazing!! keep it up this way :)

  • @goldeni02
    @goldeni02 2 года назад

    Excellent !! Thanks for this detailed explanation and demo

  • @matthewnoah5011
    @matthewnoah5011 2 года назад +1

    You can actually get around it by adding specific keys to the registry of systems. Not a microsoft fix but it will protect you.

    • @JustADragon
      @JustADragon 2 года назад

      By deleting the ms-msdt key, not by adding.
      Remove-Item REGISTRY::HKEY_CLASSES_ROOT\ms-msdt -Recurse -Force OR reg delete HKEY_CLASSES_ROOT\ms-msdt /f
      Make sure to backup first (reg export HKEY_CLASSES_ROOT\ms-msdt $env:USERPROFILE\Undo_FollinaFix_MS-MSDT.reg)

  • @firenhell02
    @firenhell02 2 года назад

    3:00 Ooohh that's powerful! Everything on a Windows machine uses the MSDT.

    • @ztech9604
      @ztech9604 2 года назад

      is that github script still working ? it showing error to me

    • @firenhell02
      @firenhell02 2 года назад

      @@ztech9604 I haven't tried to download it yet.

  • @johnniefaltz2229
    @johnniefaltz2229 2 года назад

    Nice demo Chuck.
    John I see you’re still doing your thing.
    Subscribed!

  • @roberto366
    @roberto366 2 года назад

    What happens if the user clicks "cancel" from the diagnostic tool? or force closes word

  • @krishg767
    @krishg767 2 года назад

    Superb..... I watch only like movie hacking video... Really don't know how
    it's working..... Thanks .....

  • @djones0105
    @djones0105 2 года назад

    awesome! thank you Chuck and John!

  • @devinbrasher6752
    @devinbrasher6752 2 года назад +1

    You can find it by reverse engineering msdtc.exe with Ghidra. There's a void function (doesn't accept arguments) that assigns GetCommandLineW() to its initial variable, and then calls another function that invokes StringCchCopyA() to pass the payload into the return value for GetCommandLineW(), which is a pointer to the command-line string for the current process.

  • @galaxygolden
    @galaxygolden 2 года назад

    How do you have the most basic of mugs during your coffee break sir? Lets up that game eh?

  • @bibasik7
    @bibasik7 2 года назад +3

    Zero-day? Microsoft knew about this bug for 1.5 months, they simply chose to do nothing about it.

    • @MrSpyLiam
      @MrSpyLiam 2 года назад +1

      A zero day can last for years if not addressed properly. But this is what happens when there is no government control over companies like Microsoft. They do it a lot with health and safety, but when it comes to IT systems its like meh.

  • @guycohen4403
    @guycohen4403 2 года назад

    Wow nice video, especially liked the part with the python server, I didn't know you can do this it so cool

  • @brandonbaldwin3095
    @brandonbaldwin3095 2 года назад

    Fix: Admin command prompt type: “reg export HKEY_CLASSES_ROOT\ms-msdt msdt_bkup” “reg delete HKEY_CLASSES_ROOT\ms-msdt”
    Prevents the back door of msdt from being exploited. The back door is via the online template connection word uses which is tunneled through msdt. The attacker exploits the connection redirecting to payload. If you already been a victim this will not help you, you’re already pwned.

  • @harshitagrawal5490
    @harshitagrawal5490 6 месяцев назад

    amazing video! Great work!

  • @whazzup9998
    @whazzup9998 2 года назад

    YES! More of this!

  • @bsummer
    @bsummer 2 года назад

    "once you've waited 3 years for everything to download...."
    That Line tho..

  • @sleekbr7666
    @sleekbr7666 2 года назад

    Be doing more on CVEs that arise from the wild chuck. Understood it better now.

  • @duscraftphoto
    @duscraftphoto 2 года назад +1

    This was great! I was watching and when you created the new network after you had already generated the word document I was like “that’s not going to work anymore” ha ha!
    Love yours and John’s content!

  • @Isaac0-dev
    @Isaac0-dev 2 года назад

    definetely do more of this.
    great video

  • @justice32legends
    @justice32legends 2 года назад +1

    And then there's me, who just learnt for the first time how to install office using cmd !! 🙃
    Jokes aside, Imma open all docs in virtual machines here on.

  • @orzhovthief
    @orzhovthief 2 года назад

    You watch along and everything looks fine, then shows the ms-msdt: url with arguments skip, force and you instantly realize something is wrong

  • @CoryResilient
    @CoryResilient 2 года назад

    So. How do you edit the text doc or set it up to bypass windows defender.

  • @ivegyattocomment
    @ivegyattocomment Год назад

    this is crazy, so technically they just dump that file in an email and send it to intended target and the recipient will just download and open and the rest is seeing your system crumbles xD

  • @jeffsadowski
    @jeffsadowski 2 года назад +1

    I used netcat before to emulate a postscript printer so that I could use an older printer with windows. Windows used it as a network attached postscript printer that linux used netcat to get the file and convert it to pdf then print using a driver available in linux.

  • @milo_andrs
    @milo_andrs 2 года назад

    Interesting, so the word file needs to be open everytime for you to get access?

  • @amirhoseinmohammadi1726
    @amirhoseinmohammadi1726 2 года назад

    This was GREAT. PLS make more of this videos :)

  • @hossman7432
    @hossman7432 2 года назад

    Marty Robins - El Paso Follina would whirl

  • @0hmannn
    @0hmannn Год назад

    this is such a great video! thank you for your work!

  • @CarlBProfile
    @CarlBProfile 2 года назад

    MS troubleshooter disabled, checked. Thank you for the video.