by edward | Dec 24, 2023 | Exchange 2016, Exchange 2019
In one of my lab servers, I was busy working on a project and email would just not send. I kept on getting the error below from the consoles output: Error with SMTP server… (451, b’4.7.0 Temporary server error. Please try again later. PRX2′) This...
by edward | Dec 23, 2023 | Exchange 2016, Exchange 2019, Google Captcha
In one of my recent blog posts, we covered brute forcing of the OWA page in Exchange 2019, this also applies to Exchange 2016 and Exchange 2013. If an attacker successfully gains access, they might access an account that has elevated privileges or given enough time,...
by edward | Dec 13, 2023 | Exchange 2019, PowerShell
If you are an Exchange Admin, you may have inherited Exchange Servers and are not sure what version you are running or you are simply managing Exchange but need to check Control Panel for installed updates to see what version you are on. If you have a few hundred or...
by edward | Dec 5, 2023 | Exchange 2019, Kali Linux, Metasploit
Many admins save credentials in text, log, and other format files on servers, this can be a once off thing where they are troubleshooting something or they saved it there, thinking it is in a safe place and because nobody has access to servers generally, only...
by edward | Dec 4, 2023 | Exchange 2019, BurpSuite
BurpSuite has a scanner builtin that allows you to scan a URL or URLs and this will give you an output of what is vulnerabilities or misconfigurations are set. A simple thing may be the SSL certificate on your Exchange server, while you may think this is not...
by edward | Dec 2, 2023 | Exchange 2016, CVE-2021-33766, Exchange 2019, Kali Linux, ProxyToken
In three of my previous blog posts, we looked at exploiting unpatched/vulnerable Exchange servers with “ProxyLogon”, “ProxyShell” and “ProxyNotShell”. As the exploit lists keep growing, we will look at the “ProxyToken”...