Cyber security

Msprobe – On-Prem Microsoft Solutions Discovery For Security

Discovering and securing on-premises Microsoft solutions is paramount in today’s cybersecurity landscape.

In this article, we delve into ‘msprobe,’ a powerful tool designed to aid in the identification of on-prem Microsoft products.

With its versatile modules, ‘msprobe’ empowers security professionals to pinpoint and assess potential vulnerabilities, ensuring robust protection for organizations.

About

Finding all things on-prem Microsoft for password spraying and enumeration.

The tool will used a list of common subdomains associated with your target apex domain to attempt to discover valid instances of on-prem Microsoft solutions. Screenshots of the tool in action are below:

Installing

Install the project using pipx

pipx install git+https://github.com/puzzlepeaches/msprobe.git

Usage

The tool has four different modules that assist with the discovery of on-prem Microsoft products:

  • Exchange
  • RD Web
  • ADFS
  • Skype for Business

The help menu and supported modules are shown below:

Usage: msprobe [OPTIONS] COMMAND [ARGS]...

  Find Microsoft Exchange, RD Web, ADFS, and Skype instances

Options:
  --help  Show this message and exit.

Commands:
  adfs   Find Microsoft ADFS servers
  exch   Find Microsoft Exchange servers
  full   Find all Microsoft supported by msprobe
  rdp    Find Microsoft RD Web servers
  skype  Find Microsoft Skype servers

Examples

Find ADFS servers associated with apex domain:

msprobe adfs acme.com

Find RD Web servers associated with apex domain with verbose output:

msprobe rdp acme.com -v

Find all Microsoft products hostsed on-prem for a domain:

msprobe full acme.com
Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 day ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 weeks ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago