ProxyLogon - PoC Exploit for Microsoft Exchange
PoC Exploit for Microsoft Exchange Launche
Original PoC: https://github.com/testanull
python proxylogon.py <name or IP of server> <user@fqdn>
Example:
python proxylogon.py primary [email protected]
If successful you will be dropped into a webshell. exit
or quit
to escape from the webshell (or ctrl+c)
By default, it will create a file test.aspx
. This can be changed.
@Flangvik @Testanull https://www.praetorian.com/blog/reproducing-proxylogon-exploit/
ProxyLogon - PoC Exploit for Microsoft Exchange
Reviewed by Zion3R
on
5:30 PM
Rating: