ProxyLogon - PoC Exploit For Microsoft Exchange
PoC Exploit for Microsoft Exchange Launche
Original PoC: https://github.com/testanull
python proxylogon.py <name or IP of server> <[email protected]>
Example:
python proxylogon.py primary [email protected]
If successful you will be dropped into a webshell. exit
or quit
to escape from the webshell (or ctrl+c)
By default, it will create a file test.aspx
. This can be changed.
@Flangvik @Testanull https://www.praetorian.com/blog/reproducing-proxylogon-exploit/
Source: feedproxy.google.com
ProxyLogon - PoC Exploit For Microsoft Exchange
Reviewed by Anonymous
on
1:35 PM
Rating: