5 / 15 (Wed.) 15:00 - 17:00 4F 4D

Clickbait Invasion Era (Email's Version)

The lab will walk you through specific social engineering methods until remote code execution. The instructor will introduce and demonstrate one of the most famous Outlook 2016 bugs this year and share strategies for defending against this attack.

Session Objectives

This program provides a hands-on lab for stealing NTLM Hash under low user interaction situations and conducts a remote code execution to leverage user privileges on the victim's machine. This program also includes concepts of identifying social engineering, mechanisms of long-term defense against this attack, and a quick solution to the specific CVEs.

Session Summary
  1. Introduction of Social engineering.
  2. Introduction of Word macro phishing attack.
  3. CVE-2022-30190 (hands-on and detail explained).
  4. Introduction of NTLM Hash and the severity of hash leakage.
  5. CVE-2024-21413 (hands-on and detail explained).
  6. Defense method.
Device Requirement You Should Prepared for
  1. Bring Your Laptop.
  2. Capable of connecting to WiFi or personal hotspots.
  3. Equipped with a functioning Chrome browser.
  4. Operating systems: Windows 10, 11, Linux, or MacOS.
  5. Please prepare remote desktop tools (recommended remote desktop).
Skills Requirement You Should Have
  1. Basic operational experience with Linux and Bash.
  2. Basic operational experience with Windows and cmd.
Limit on the Number of Attendee
20 people
Chen
SPEAKER
Junior Security Researcher
CHT Security
How
SPEAKER
Security Researcher
CHT Security

TOPIC / TRACK
CyberLAB

LOCATION
Taipei Nangang Exhibition Center, Hall 2
4F 4D

LANGUAGE
Chinese