
Playing with ZERO-DAY vulnerability “follina”
- Frank
- June 7, 2022
- cve-2022-30190
- follina
- follina exploit
- follina vulnerability
- hacker
- hacking
- malwars
- Microsoft
- microsoft office
- msdt exploit
- msdt vulnerability
- Python
- remote code execution
- remote code execution explained
- remote code execution tutorial
- remote code execution vulnerability
- transomware
- vulnerability
- windows 11
- zero day
In this video NetworkChuck teamed up with John Hammond to talk about the NEW and SCARY Microsoft Vulnerability. NetworkChuck and John Hammond are going to teach you about a new dangerous Windows Zero-day vulnerability called “follina” and they are even going to show you how to test it out in your own Zero-day lab using […]
Read More
Is This The Worst Microsoft Office Virus I’ve Ever Seen?!
Its one thing For MS Office to have a vulnerability, its another for that vulnerability to lead to RCE, but a NO CLICK RCE vulnerability codenamed Follina in Microsoft Word that doesn’t even require macros?
Read More
Follina- MSDT Exploit- CVE2022-30190 Explained with Detection and Mitigation
- Frank
- June 2, 2022
- follina
- follina vulnerability
- follina vulnerability cve
- follina vulnerability microsoft
- microsoft office remote code execution
- msdt vuln
- msdt vulnerability
- remote code execution
- remote code execution exploit
- remote code execution poc
- remote code execution tf2
- remote code execution tutorial
- remote code execution via webshell upload
- remote code execution vulnerability
- zero day attack
- zero day vulnerability
Here is another explanation of Follina- MSDT Exploit which has been numbered as CVE2022-30190. I have tried to explain it from timeline, history, demo perspective, mitigation, detection strategies everything. The bug is a Microsoft Windows Support Diagnostic Tool (MSDT) remote code execution vulnerability reported by crazyman of the Shadow Chaser Group. Microsoft is now tracking […]
Read More
New Zero Day Exploit – Protect your PC from Follina
The new Follina zero-day attack is being exploited in the wild. Dave explains how to lock out attackers with a simple registry fix after explaining the Top 3 styles of zero-day attack: the application exploit, the operating system exploit, and the escalation exploit.
Read More
Does Windows have Back Doors?
- Frank
- June 2, 2022
- back door
- backdoor
- Exploit
- follina
- follina exploit
- follina zero day
- hacker
- microsoft office
- microsoft windows
- ms-dos
- Security
- Software
- software developer
- software development
- software development process
- software development projects
- software engineering
- trojan
- Trojan horse virus
- virus
- Windows
- windows 11
- windows back door
- zero-day
Retired Microsoft engineer Davepl discusses “back doors” in Windows, the implications, and how the software developer protects against such attacks from rogues, hackers, and nation-states. Understand how back doors are like the Follina zero-day exploit in Office, giving complete control of the system to the attacker.
Read More