JavaScriptが無効です。ブラウザの設定でJavaScriptを有効にしてください
再生時間:
投稿日:
動画サイト:
画質:
Satnam Narang, Senior Staff Research Engineer from Tenable's Security Response Team, discusses the latest high-profile vulnerability found ...
YouTube-Tenable
Intro
CVE-2023-23397 Overview
Proof of Concept Exploit
Patching Microsoft Outlook
Conclusion
In this week's video, I exploit Outlook to relay credentials to NTLMrelayx, get a certificate of a domain admin, and fully take over a ...
YouTube-Cyber Attack & Defense
Introduction
Victim Domain Admin
NTLM Relay X to ADCS
PowerShell Outlook Exploit
Getting Hashes from a Cert
Certipy to Pull Hashes
DCsync with Secrets Dump
Detecting Pass the Cert
Thanks for Watching
Exploring the vulnerability in Microsoft Outlook, renowned for facilitating attacks by the group APT28 (Fancy Bear) across vital global ...
YouTube-Threat Talks
In this video, I'll be walking through the CVE-2023-23397 Outlook Escalation of Privilege exploit via a PoC. This exploit allows an attacker ...
YouTube-Nick Berrie
Microsoft Office Outlook Privilege Escalation Vulnerability POC This video is an accompanying video to our blog at: www.darkrelay.com/blog ...
YouTube-DarkRelay Security Labs
In this video, I will show you how to patch and secure your Confluence server from the CVE-2023-22527 vulnerability, which allows ...
YouTube-vulnmachines
Jenkins is an open-source automation server. Jenkins uses the args4j library to parse command arguments and options on the Jenkins ...
Jenkins 2.217 through 2.441 (both inclusive), LTS 2.222.1 through 2.426.2 (both inclusive) does not perform origin validation of requests ...
YouTube-zalepentester