Microsoft MSHTML Remote Code Execution Vulnerability | POC | 0-day | CVE-2021-40444
Автор: Cyberskills99
Загружено: 2021-09-14
Просмотров: 2739
In this video, Microsoft MSHTML RCE Vulnerability POC demonstrated using ActiveX, How to generate Malicious document file and how to configure C&C server to deliver the reset of the payload to the victim machine; more insight about customization of malicious document and mitigation strategies.
🔔 Don't Forget to subscribe to my YouTube channel
/ cyberskills99
🔗 Links
MITRE ATT&CK
https://attack.mitre.org/
Microsoft
https://msrc.microsoft.com/update-gui...
GitHub
https://github.com/lockedbyte/CVE-202...
TrendMicro
https://www.trendmicro.com/en_us/rese...
📃 Watch related playlists and videos
/ @cyberskills99
#Microsoft #MSHTML #RCE #ActiveX #POC #Vulnerability #CVE-2021-40444
⚠️ Disclaimer
I believe that getting familiar about the different tools, techniques and procedures; those are used by adversaries, is the need of the time. I do not promote, encourage, support any illegal activity. If you plan to use the information for illegal purposes. I cannot be held responsible for any misuse of the given information.
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: