COLLABORATION PRO
  • Home
  • Exchange 2019
  • Exchange 2016
  • Exchange 2013
  • Exchange 2010
  • Exchange Online
  • Azure
  • Other Articles
  • Windows
  • Contact
  • About
Select Page
Exchange 2019:- CVE-2023-23397 Exploit (Affecting the Outlook Thick Client)

Exchange 2019:- CVE-2023-23397 Exploit (Affecting the Outlook Thick Client)

by edward | Dec 26, 2023 | Exchange 2019, CVE-2023-23397, Kali Linux

In my Exchange 2019 lab, I tested out this exploit and it works which is scary. The POC listed Outlook 2013 and 2016 but it also worked for me on Outlook 2019. If you want to read about this POC, head over to GitHub here:...
Exchange 2019:- CVE-2023-23397 Exploit (Affecting the Outlook Thick Client)

Exchange 2019:- Finding hidden credentials after obtaining a shell

by edward | Dec 5, 2023 | Exchange 2019, Kali Linux, Metasploit

Many admins save credentials in text, log, and other format files on servers, this can be a once off thing where they are troubleshooting something or they saved it there, thinking it is in a safe place and because nobody has access to servers generally, only...
Exchange 2019:- CVE-2023-23397 Exploit (Affecting the Outlook Thick Client)

Exchange 2019:- ProxyToken Exploit

by edward | Dec 2, 2023 | Exchange 2016, CVE-2021-33766, Exchange 2019, Kali Linux, ProxyToken

In three of my previous blog posts, we looked at exploiting unpatched/vulnerable Exchange servers with “ProxyLogon”, “ProxyShell” and “ProxyNotShell”. As the exploit lists keep growing, we will look at the “ProxyToken”...
Windows Server 2022:- Bypassing Windows Defender with Nim

Windows Server 2022:- Bypassing Windows Defender with Nim

by edward | Dec 1, 2023 | Exchange 2019, Kali Linux, Windows Defender, Windows Server 2022

This article is about a YouTube video by “Tyler Ramsbey” that I used in my own environment to get a Reverse Shell from a Windows 2022 Server that is fully patched and Windows Defender did not detect me. All credit goes to “Tyler” and to...
Exchange 2019:- CVE-2023-23397 Exploit (Affecting the Outlook Thick Client)

Exchange 2019:- ECP_DLP_Policy Exploit

by edward | Nov 30, 2023 | Exchange 2016, ECP_DLP_Policy, Exchange 2019, Kali Linux

I have been covering some of the exploits in Exchange Server in a few of my blog posts and wanted to highlight the fact that I tested another one which allowed me to get a shell on the Exchange Server. Metasploit has a module for the above exploit which worked against...
Exchange 2019:- CVE-2023-23397 Exploit (Affecting the Outlook Thick Client)

Exchange 2019:- ProxyNotShell Exploit

by edward | Nov 29, 2023 | Exchange 2016, Exchange 2013, Exchange 2019, Kali Linux, ProxyNotShell

In two of my previous blog posts, we looked at exploiting unpatched/vulnerable Exchange servers with “ProxyLogon” and “ProxyShell”. As the exploit lists keep growing, we will look at the “ProxyNotShell” exploit. One of my many...
« Older Entries
Copyright © 2024 COLLABORATION PRO