Investigating Conti Ransomware on Microsoft Exchange with Splunk | TryHackMe
HTML-код
- Опубликовано: 8 янв 2022
- In this video walk-through, we investigated the Conti ransomware that hit Microsoft Exchange via a series of vulnerabilities. We used lab material from TryHackMe Conti room.
*******************
Written Walk-Through
motasem-notes.net/investigati...
*****************
Receive Cyber Security Field Notes and Special Training Videos
/ @motasemhamdan
******
Want to learn web application penetration testing? Enroll in My Udemy Course
www.udemy.com/course/the-comp...
**********
Room Link
tryhackme.com/room/investigat...
*********
Patreon
www.patreon.com/motasemhamdan...
Backup channel
/ @hacknotesbackup
My Movie channel:
/ @motasemhamdanhacknotes
******
Answer to the last question
CVE-2020-0796,CVE-2018-13374, CVE-2018-13379
Shoutout to @clarksoft
ruclips.net/channel/UCgBIrFuaF1e45VMzvl_3d9g
How did you manage to track the exact CVE'?
Now I know the importance of understanding Windows Processes, Logs, and the Interesting Fields. It was a tough one for me and I only solved it with your help, but I made sure I understood the reasons why you made each decision. Thank you so much.
Great video man. It was very helpful. I am learning Splunk and this is a perfect walkthrough.
Your videos are helping me through university. Thank you soo much
Good explanation, thankyou
Very helpful, this was my first experience with Splunk
Sir,could you please help me to solve out(Protocols and Servers 2)room of Jr Penetration Tester.
Hello Amiliya, I will publish a walkthrough on that soon.
Gracias.
Dude, the volume in all your videos is seriously always bad. Extremely hard to hear even with volume all the way up to 100.
CVE-2020-0796,CVE-2018-13374, CVE-2018-13379