by edward | Dec 5, 2023 | Exchange 2019, Kali Linux, Metasploit
Many admins save credentials in text, log, and other format files on servers, this can be a once off thing where they are troubleshooting something or they saved it there, thinking it is in a safe place and because nobody has access to servers generally, only...
by edward | Dec 4, 2023 | Exchange 2019, BurpSuite
BurpSuite has a scanner builtin that allows you to scan a URL or URLs and this will give you an output of what is vulnerabilities or misconfigurations are set. A simple thing may be the SSL certificate on your Exchange server, while you may think this is not...
by edward | Dec 2, 2023 | Exchange 2016, CVE-2021-33766, Exchange 2019, Kali Linux, ProxyToken
In three of my previous blog posts, we looked at exploiting unpatched/vulnerable Exchange servers with “ProxyLogon”, “ProxyShell” and “ProxyNotShell”. As the exploit lists keep growing, we will look at the “ProxyToken”...
by edward | Dec 1, 2023 | Exchange 2019, Kali Linux, Windows Defender, Windows Server 2022
This article is about a YouTube video by “Tyler Ramsbey” that I used in my own environment to get a Reverse Shell from a Windows 2022 Server that is fully patched and Windows Defender did not detect me. All credit goes to “Tyler” and to...
by edward | Dec 1, 2023 | Exchange 2019
Microsoft released the November 2023 Security Update (SU) for Exchange Server 2019. To read about this update and more, you can head over to the URL below:...
by edward | Nov 30, 2023 | Exchange 2016, ECP_DLP_Policy, Exchange 2019, Kali Linux
I have been covering some of the exploits in Exchange Server in a few of my blog posts and wanted to highlight the fact that I tested another one which allowed me to get a shell on the Exchange Server. Metasploit has a module for the above exploit which worked against...