Follina- MSDT Exploit- CVE2022-30190 Explained with Detection and Mitigation

Поделиться
HTML-код
  • Опубликовано: 15 ноя 2024

Комментарии • 22

  • @BlackPerl
    @BlackPerl  2 года назад

    🔗LINK FOR everything- github.com/archanchoudhury/MSDT_CVE-2022-30190
    In this episode I have explained Follina- MSDT Exploit which has been numbered as CVE2022-30190. I have tried to explain it from timeline, history, demo perspective, mitigation, detection strategies everything. The bug is a Microsoft Windows Support Diagnostic Tool (MSDT) remote code execution vulnerability reported by crazyman of the Shadow Chaser Group. Microsoft is now tracking it as CVE-2022-30190. The flaw impacts all Windows versions still receiving security updates (Windows 7+ and Server 2008+).
    As security researcher nao_sec found, it is used by threat actors to execute malicious PowerShell commands via MSDT in what Redmond describes as Arbitrary Code Execution (ACE) attacks when opening or previewing Word documents.
    "An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application," Microsoft explains.
    WATCH BELOW Playlists as well, if you want to make your career in DFIR and Security Operations!!
    -------------------------------------------------------------------------------------------------------------------------
    INCIDENT RESPONSE TRAINING Full Course 👉ruclips.net/p/PLj...
    DFIR Free Tools and Techniques 👉 ruclips.net/p/PLj...
    Windows and Memory Forensics 👉 ruclips.net/p/PLj...
    Malware Analysis 👉 ruclips.net/p/PLj...
    SIEM Tutorial 👉 ruclips.net/p/PLj...
    Threat Hunt & Threat Intelligence 👉 ruclips.net/p/PLj...
    Threat Hunt with Jupyter Notebook👉 ruclips.net/p/PLj...
    📞📲
    FOLLOW ME EVERYWHERE-
    -------------------------------------------------------------------------------------------------------------------------
    ✔ LinkedIn: www.linkedin.com/company/blac...
    ✔ You can reach out to me personally in LinkedIn as well- bit.ly/38ze4L5
    ✔ Twitter: @blackperl_dfir
    ✔ Git: github.com/archanchoudhury
    ✔ Insta: (blackperl_dfir)instagram.com/blackperl_d...
    ✔ Can be reached via archan.fiem.it@gmail.com

  • @ian230187
    @ian230187 2 года назад

    Thanks Archan..
    Appreciate how you collated all the data❤️

  • @Malisha_Rasiru
    @Malisha_Rasiru Год назад

    Please tell me the windows exact version affected this and where can I get that to test for my university assignment I must do it 😥😥

  • @_AKA_ThaScientist
    @_AKA_ThaScientist 2 года назад

    Very insightful vid thanks

    • @BlackPerl
      @BlackPerl  2 года назад

      Thank you for the feedback

  • @anishdash2084
    @anishdash2084 2 года назад

    Excellent work there!!

  • @salluc1712
    @salluc1712 2 года назад

    Thank you best video

    • @BlackPerl
      @BlackPerl  2 года назад

      Thank you for the feedback

  • @s.m.8570
    @s.m.8570 2 года назад +1

    What is the password for the file?

  • @nigamgandhi3509
    @nigamgandhi3509 Год назад

    Please send me doc. File password without we can't go forward

    • @BlackPerl
      @BlackPerl  Год назад

      Which doc you are referring to?

  • @psynamessynames2272
    @psynamessynames2272 2 года назад

    to zero to to 🤣🤣

    • @BlackPerl
      @BlackPerl  2 года назад

      Two zero two two! Lol

  • @siviwentanjana524
    @siviwentanjana524 2 года назад

    What is the password to unzip 05-2002-0438.doc.zip , I tried kali, Kali , Password, password ,admin ,admin ,root Root ,Toor ,toor all are failing