ProxyLogon - PoC Exploit For Microsoft Exchange


PoC Exploit for Microsoft Exchange Launche

Original PoC: https://github.com/testanull


How to use:

python proxylogon.py <name or IP of server> <[email protected]>


Example:

python proxylogon.py primary [email protected]

If successful you will be dropped into a webshell. exit or quit to escape from the webshell (or ctrl+c)

By default, it will create a file test.aspx. This can be changed.


Special Thanks and resources:

@Flangvik @Testanull https://www.praetorian.com/blog/reproducing-proxylogon-exploit/




Source: feedproxy.google.com
ProxyLogon - PoC Exploit For Microsoft Exchange ProxyLogon - PoC Exploit For Microsoft Exchange Reviewed by Anonymous on 1:35 PM Rating: 5