Exploiting CVE-2024-21413 Microsoft Outlook Remote Code Execution

Поделиться
HTML-код
  • Опубликовано: 6 сен 2024
  • This script presents a proof of concept (PoC) for CVE-2024-21413, a significant security vulnerability discovered in Microsoft Outlook with a CVSS of 9.8. Termed the #MonikerLink bug, this vulnerability has far-reaching implications, including the potential leakage of local NTLM information and the possibility of remote code execution. Moreover, it highlights an attack vector that could bypass Office Protected View, thereby extending its threat to other Office applications
    Exploit link : github.com/Mdu...
    tags:
    #CyberSecurity
    #EthicalHacking
    #InfoSec
    #Hacking
    #PenetrationTesting
    #CyberAttack
    #BugBounty
    #CyberAware
    #CyberDefense
    #VulnerabilityAssessment
    #ITSecurity
    Copyright Disclaimer under Section 107 of the copyright act 1976, allowance is made for fair use for purposes such as criticism, comment, news reporting, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favour of fair use.
    ---
    This Channel is meant for educational purposes only and doesn't promote or encourage any illegal activities.

Комментарии • 5

  • @jyothikiran1558
    @jyothikiran1558 6 месяцев назад

    Impact of this vulnerability

    • @Thecybermonkey
      @Thecybermonkey  6 месяцев назад

      As you see in the Poc the vulnerability dumps the NTLM hash and can be chained to RCE which is critical

  • @m9k9veliii
    @m9k9veliii Месяц назад

    How come the IP address the poison answer was sent to is different from the windows IP address? Windows IP ( Delloite is 192.168.233.83), the poison answer was sent to 192.168.233.254

  • @kartheekkandalam2274
    @kartheekkandalam2274 5 месяцев назад

    I am using kali linux VM ware to run the exploit and in windows machine with vulnerable outlook version i tried this in same laptop …. But not able to capture hash…. 😢
    Please help me

    • @Thecybermonkey
      @Thecybermonkey  4 месяца назад

      Follow the video carefully use responder to capture the hash