تقييمات الطلاب
( 5 من 5 )
١ تقييمات
فيديو شرح Printer Driver Exploitation with Metasploit CTF Walkthrough ضمن كورس اطار Metasploit شرح قناة Motasem Hamdan Cyber Security & Tech، الفديو رقم 2 مجانى معتمد اونلاين
In this video walk-through, we covered a scenario of gaining access to a windows server machine with vulnerable printer software. We gained the first shell by exploiting a weakness in the SMB protocol to obtain net-ntlmv2 hash by which we were able to login via Evil-Winrm. We performed windows privilege escalation by identifying the printer and its driver model which turned out to be vulnerable to CVE-2019-19363. We demonstrated another path to achieve root via the print nightmare exploit (CVE-2021-1675 ). This was part of Intro to printer exploitation track.
Receive Cyber Security Field Notes and Special Training Videos
https://www.youtube.com/channel/UCNSdU_1ehXtGclimTVckHmQ/join
Resources
Writeup
https://motasem-notes.net/printer-driver-exploitation-with-metasploit-hackthebox-driver/
Printer Nightmare
https://github.com/calebstewart/CVE-2021-1675
HackTheBox Driver
https://app.hackthebox.com/machines/387
CVE-2019-19363
https://pentagrid.ch/en/blog/local-privilege-escalation-in-ricoh-printer-drivers-for-windows-cve-2019-19363/
Patreon
https://www.patreon.com/motasemhamdan?fan_landingtrue
Instagram
https://www.instagram.com/dev.stuxnet/
Twitter
https://twitter.com/ManMotasem
Facebook
https://www.facebook.com/motasemhamdantty/
LinkedIn
[1]: https://www.linkedin.com/in/motasem-hamdan-7673289b/
[2]: https://www.linkedin.com/in/motasem-eldad-ha-bb42481b2/
Website
https://www.motasem-notes.net
Backup channel
https://www.youtube.com/channel/UCF2AfcPUjr7r8cYuMvyRTTQ
My Movie channel:
https://www.youtube.com/channel/UCilElKPoXEaAfMf0bgH2pzA