Sources:
[1] Attacking MS Exchange Web Interfaces – PT SWARM (2020)
[2] Arseniy Sharoglazov – Practical Use Cases of Exploiting MS Exchange in External Penetration Tests (PositiveHack Talks Hanoi, Nov 2024)
[3] CVE research + real-world campaign analysis (2021–2025)
Scope: External/Internal authorized penetration testing of on-premises MS Exchange
Warning: For authorized engagements only.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Java.perform(() => { | |
| var inc = 0; | |
| function waitForLibrary(name, callback) { | |
| var lib = null; | |
| var interval = setInterval(() => { | |
| try { | |
| lib = Module.ensureInitialized(name); | |
| console.log(`[+] ${name} is loaded`); | |
| clearInterval(interval); |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| unbind C-b | |
| set-option -g prefix C-a | |
| bind-key C-a send-prefix | |
| bind | split-window -h | |
| bind - split-window -v | |
| unbind '"' | |
| unbind % | |
| bind r source-file ~/.tmux.conf |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| `-=[SQL injection Queries]=- | |
| HOW TO SUCCESSFULLY INJECTING SQL INJECTION | |
| [~] after id no. like id=1 +/*!and*/+1=0 [~] | |
| EX: site.com?index.php?pageid=3 div+0 Union select 1,version(),3,4,5 | |
| +div+0 | |
| +div false | |
| +Having+1=0+ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import requests | |
| import socket | |
| import sys | |
| import random | |
| import string | |
| banner=""" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import requests | |
| import sys | |
| import re | |
| import random | |
| import string | |
| import socket | |
| import time | |
| proxies={"http":"127.0.0.1:8080"} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import requests | |
| import sys | |
| import re | |
| import random | |
| import string | |
| banner=""" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| // $ frida -l antiroot.js -U -f com.example.app --no-pause | |
| // CHANGELOG by Pichaya Morimoto (p.morimoto@sth.sh): | |
| // - I added extra whitelisted items to deal with the latest versions | |
| // of RootBeer/Cordova iRoot as of August 6, 2019 | |
| // - The original one just fucked up (kill itself) if Magisk is installed lol | |
| // Credit & Originally written by: https://codeshare.frida.re/@dzonerzy/fridantiroot/ | |
| // If this isn't working in the future, check console logs, rootbeer src, or libtool-checker.so | |
| Java.perform(function() { | |
| var RootPackages = ["com.noshufou.android.su", "com.noshufou.android.su.elite", "eu.chainfire.supersu", |
NewerOlder