ProxyLogon - PoC Exploit for Microsoft Exchange

PoC Exploit for Microsoft Exchange Launche

Original PoC: https://github.com/testanull

How to use:

python proxylogon.py <name or IP of server> <[email protected]>


python proxylogon.py primary [email protected]

If successful you will be dropped into a webshell. exit or quit to escape from the webshell (or ctrl+c)

By default, it will create a file test.aspx. This can be changed.

Special Thanks and resources:

@Flangvik @Testanull https://www.praetorian.com/blog/reproducing-proxylogon-exploit/

Disqus Comments