CVE-2025-24071: POC | Demo | Zero Click Exploit | Stealing credentials
Автор: Prabhsimran Singh
Загружено: 2025-04-21
Просмотров: 1904
In this security research video, I demonstrate CVE-2025-24071, which involves creating Windows Library files (.library-ms) that reference remote network shares. This proof-of-concept shows how a simple Rust application deployed through GitHub Actions can generate these files automatically.
The demo walks through:
1. How the vulnerability works with Windows Library files
2. Setting up a Rust program to create customized .library-ms files
3. Configuring GitHub Actions to run the code with secret parameters
4. How the workflow generates and uploads the resulting file as an artifact
Note: Captured hashes for Repsonder are here: /usr/share/responder/logs
This educational content is intended for cybersecurity professionals, pentesters, and those interested in understanding modern security vulnerabilities. All techniques shown are for research purposes only and should never be used without proper authorization.
Repository: https://github.com/pswalia2u/CVE-2025...
References: https://research.checkpoint.com/2025/...
#CyberSecurity #Vulnerabilities #CVE #WindowsSecurity #GithubActions #SecurityResearchRetryClaude can make mistakes. Please double-check responses.
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: