lol - when you showed the deny list, I thought was a easy capture the flag game - 😊 not a live medical platform
asksearchknock
Awesome! First time seeing zero-day in action. Thankyou John!
_secret-star
Thanks John, your timing is impeccable. I was just reading about the hospital hacks and was wondering how it was happening. This is great to see the whole process of what it is, how its attackable and how to defend against the threat. Been in IT for awhile and hoping to transfer to cyber. Is there a role that doesn't both sides like you demo here in the video thrse days?
angelsepulveda
I love this channel. Their simple methods of teaching are amazing.
All_u_need_channel
I’m a integration engineer for a hospital…. thank god we don’t use Mirth.
But overall, hospital systems are super tight in network security. Ain’t no way anyone is breaking into our application servers. We get tested constantly for social attacks, plus our systems are all local/self-hosted anyways. Our security guards are all pretty paranoid scary looking dudes
ByDesignation
I love your videos man, but wow the popping on your condenser mic rips through my speakers!
OneOfThePetes
Great practical: both building the novel intrusion side and the detection rule authoring side.
xCheddarBbx
The stages involved in resolving issues related to CVE-2023-43208 include:
1. Discovery: The vulnerability is discovered, in this case, arising from an incomplete patch for CVE-2023-37679.
2. Reporting: The vulnerability is reported by IHTeam.
3. Patching: A patch for the vulnerability is developed and released, as seen in Mirth Connect version 4.4.0.
4. Investigation: The patch is analyzed to understand the impact and scope of the vulnerability.
5. Mitigation: Organizations utilizing affected software versions are advised to update to Mirth Connect version 4.4.1 to mitigate the risks associated with CVE-2023-43208.
奧夫恰連科維塔利
Awesome content as usual John. Keep doing what you do. You’re the man!
outcast
What a fantastic video John. Keep up the good work!
unibrowser
I am working as a medical biller and I have used that software before
lance_c
They way you type with your middle finger is wild, John.
Jordan-hzwr
Yes amazing channel. Its just Inspire me.
mahamusmanmahamusman
a good learning experience for me. Thank you John!
GDLVL
Excellent Video John, thanks for sharing
calvinstar
This is loose in the wild. I've got several letters saying my stuff was compromised.
Nobodyday
Seems like the License Key is only if you want to install extensions via that Mirth Connect program, weird
slybandit
Hey John, If I want to find this vulnerable code in ghidra, what file should I target? There are so many complications
SomeOne-mmwr
Excellent, Please do more of such exploit demos.
punithraj
Is it just me or does this guy sound like Seth Rogan?