COLLABORATION PRO
  • Home
  • Exchange 2019
  • Exchange 2016
  • Exchange 2013
  • Exchange 2010
  • Exchange Online
  • Azure
  • Other Articles
  • Windows
  • Contact
  • About
Select Page
Exchange 2019:- CVE-2023-23397 Exploit (Affecting the Outlook Thick Client)

Exchange 2019:- CVE-2023-23397 Exploit (Affecting the Outlook Thick Client)

by edward | Dec 26, 2023 | Exchange 2019, CVE-2023-23397, Kali Linux

In my Exchange 2019 lab, I tested out this exploit and it works which is scary. The POC listed Outlook 2013 and 2016 but it also worked for me on Outlook 2019. If you want to read about this POC, head over to GitHub here:...
Exchange 2019:- CVE-2023-23397 Exploit (Affecting the Outlook Thick Client)

Solve Exchange 2019 SMTP error by quickly updating your DNS.

by edward | Dec 24, 2023 | Exchange 2016, Exchange 2019

In one of my lab servers, I was busy working on a project and email would just not send. I kept on getting the error below from the consoles output: Error with SMTP server… (451, b’4.7.0 Temporary server error. Please try again later. PRX2′) This...
Exchange 2019:- CVE-2023-23397 Exploit (Affecting the Outlook Thick Client)

Secure Exchange 2019 OWA with a Google Captcha option.

by edward | Dec 23, 2023 | Exchange 2016, Exchange 2019, Google Captcha

In one of my recent blog posts, we covered brute forcing of the OWA page in Exchange 2019, this also applies to Exchange 2016 and Exchange 2013. If an attacker successfully gains access, they might access an account that has elevated privileges or given enough time,...
Exchange 2019:- CVE-2023-23397 Exploit (Affecting the Outlook Thick Client)

Exchange 2019:- Get the Version with Product Name in PowerShell

by edward | Dec 13, 2023 | Exchange 2019, PowerShell

If you are an Exchange Admin, you may have inherited Exchange Servers and are not sure what version you are running or you are simply managing Exchange but need to check Control Panel for installed updates to see what version you are on. If you have a few hundred or...
Exchange 2019:- CVE-2023-23397 Exploit (Affecting the Outlook Thick Client)

Exchange 2019:- Finding hidden credentials after obtaining a shell

by edward | Dec 5, 2023 | Exchange 2019, Kali Linux, Metasploit

Many admins save credentials in text, log, and other format files on servers, this can be a once off thing where they are troubleshooting something or they saved it there, thinking it is in a safe place and because nobody has access to servers generally, only...
« Older Entries
Next Entries »
Copyright © 2024 COLLABORATION PRO