Playing with Exploits - OMIGod

00:00 - Intro


01:00 - Start of installing OMI Locally


03:00 - Downloading the exploit, but get a connection error because it cannot talk to OMI


03:45 - Editing the OMI Configuration to set it to listen on 5986


05:45 - The exploit still isn't working debugging to find it is missing a namespace


07:50 - Finding the SCX Package Name and using a Index.Of Google Dork to find it on an open HTTP directory


10:00 - Installing the SCX Agent and getting code execution


11:13 - Setting the exploit to go through BurpSuite so we can understand how it works


13:40 - Going over the blog post to understand why it was vulnerable


16:35 - Talking about how the researchers may have found it. MS Patched it without major announcement and it was in the Git Changelog!


 


More awesome videos from IppSec: https://www.youtube.com/c/ippsec



Support the originator by clicking the read the rest link below.