Волосатый бублик
5.97K subscribers
337 photos
2 videos
55 files
1.56K links
All credits to authors.
Download Telegram
#exchange #outlook #owa #version

Хорошая дока по верcиям Exchange (OWA) и идентификации применимых к ней уязвимостей. Почему бы майкрософту не сделать что-то удобное подобное не понятно.

https://exchangeserverversions.blogspot.com/
#cve #outlook

Microsoft Outlook Information Disclosure Vulnerability (leak password hash / CVE-2023-35636)

https://github.com/duy-31/CVE-2023-35636
#outlook #rce

Critical Microsoft Outlook Vulnerability Executes as Email is Opened

https://blog.morphisec.com/cve-2024-30103-microsoft-outlook-vulnerability
#outlook #c2

[ Specula - Turning Outlook Into a C2 With One Registry Change ]

There exist a few singular Registry changes that any non-privileged user can make that transform the Outlook email client into a beaconing C2 agent. Given that outlook.exe is a trusted process, this allows an attacker persistent access to a network that we have found often goes unnoticed. This technique has been reported on before and despite that continues to be a weak point in many otherwise very well-guarded networks.

Blog (with detection and prevention guides): https://trustedsec.com/blog/specula-turning-outlook-into-a-c2-with-one-registry-change

Tool: https://github.com/trustedsec/specula

Wiki: https://github.com/trustedsec/specula/wiki

Written by Christopher Paschen and Oddvar Moe

As always great work by TrustedSec team! Webinar recording should be published soon and this post will be updated.