Welcome to the Off-Shore Club

The #1 Social Engineering Project in the world since 2004 !

💣Exploit [0-Click] Microsoft Outlook Remote Code Execution Vulnerability | PoC CVE-2024-21413

Gold

Sukadidas

Suka Business Suka
Instructor
USDT(TRC-20)
$0.0

📜 Description​

This script presents a proof of concept (PoC) for CVE-2024-21413, a significant security vulnerability discovered in Microsoft Outlook with a CVSS of 9.8. Termed the #Mo#MonikerLinkg, this vulnerability has far-reaching implications, including the potential leakage of local NTLM information and the possibility of remote code execution. Moreover, it highlights an attack vector that could bypass Office Protected View, thereby extending its threat to other Office applications.


🚀 Usage​

Use this tool responsibly and ensure you have authorization from the target system's owner. This script requires SMTP authentication to send an email, bypassing SPF, DKIM, and DMARC checks, which helps in simulating a real-world attack scenario more effectively.


python CVE-2024-21413.py
--server "<SMTP server>"
--port <SMTP port> --username "<SMTP username>"
--password "<SMTP password>"
--sender "<sender email>"
--recipient "<recipient email>"
--url "<link URL>"
--subject "<email subject>"

Parameters:


  • --server: SMTP server hostname or IP.
  • --port: SMTP server port.
  • --username: SMTP server username for authentication.
  • --password: SMTP server password for authentication.
  • --sender: Sender email address.
  • --recipient: Recipient email address.
  • --url: Malicious path to include in the email.
  • --subject: Email subject.

Initial Sending​

Display in Outlook (no warnings, no Protected view)​

1712323951960

Wireshark capture including NTLM credentials (you can also run impacket, alternatively)​

1712323967294

🧐 Why SMTP Authentication?​

SMTP authentication is crucial for this demonstration to ensure the email sent bypasses common email validation checks such as SPF (Sender Policy Framework), DKIM (DomainKeys Identified Mail), and DMARC (Domain-based Message Authentication, Reporting, and Conformance). These security measures are designed to detect and prevent email spoofing, where attackers send emails from a forged address. By using authenticated SMTP, the demonstration closely mimics how a sophisticated attacker might circumvent these protections, making the testing environment more realistic and highlighting the importance of comprehensive email security practices.

0-click NTLM Leak​

1712324004145

1-click Remote Code Execution (RCE)​

1712324023545

🚀
POC Code (Python):​

 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Friendly Disclaimer We do not host or store any files on our website except thread messages, most likely your DMCA content is being hosted on a third-party website and you need to contact them. Representatives of this site ("service") are not responsible for any content created by users and for accounts. The materials presented express only the opinions of their authors.
🚨 Do not get Ripped Off ! ⚖️ Deal with approved sellers or use RTM Escrow on Telegram
Gold
Mitalk.lat official Off Shore Club Chat


Gold

Panel Title #1

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Panel Title #2

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.
Top