Exploitation Basics: Moniker Link (CVE-2024-21413)

J3bitokJ3bitok
1 min read

In this article, I will write a write-up for Moniker Link (CVE-2024-21413) that covers the Moniker Link (CVE-2024-21413), Exploitation, Detection, and Remediation.

  1. What "Severity" rating has the CVE been assigned? Critical

  2. What Moniker Link type do we use in the hyperlink? file://

  3. What is the special character used to bypass Outlook's "Protected View"? !

  4. What is the name of the application that we use on the AttackBox to capture the user's hash? responder

  5. What type of hash is captured once the hyperlink in the email has been clicked? netNTLMv2

Thank you for reading my article. Please leave any questions or comments on improving my learning journey and the THM challenges. We can also connect more on LinkedIn or X.

0
Subscribe to my newsletter

Read articles from J3bitok directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

J3bitok
J3bitok

Software Developer Learning Cloud and Cybersecurity Open for roles * If you're in the early stages of your career in software development (student or still looking for an entry-level role) and in need of mentorship you can book a session with me on Mentorlst.com.