Discovering and securing on-premises Microsoft solutions is paramount in today’s cybersecurity landscape.
In this article, we delve into ‘msprobe,’ a powerful tool designed to aid in the identification of on-prem Microsoft products.
With its versatile modules, ‘msprobe’ empowers security professionals to pinpoint and assess potential vulnerabilities, ensuring robust protection for organizations.
Finding all things on-prem Microsoft for password spraying and enumeration.
The tool will used a list of common subdomains associated with your target apex domain to attempt to discover valid instances of on-prem Microsoft solutions. Screenshots of the tool in action are below:
Install the project using pipx
pipx install git+https://github.com/puzzlepeaches/msprobe.git The tool has four different modules that assist with the discovery of on-prem Microsoft products:
The help menu and supported modules are shown below:
Usage: msprobe [OPTIONS] COMMAND [ARGS]...
Find Microsoft Exchange, RD Web, ADFS, and Skype instances
Options:
--help Show this message and exit.
Commands:
adfs Find Microsoft ADFS servers
exch Find Microsoft Exchange servers
full Find all Microsoft supported by msprobe
rdp Find Microsoft RD Web servers
skype Find Microsoft Skype servers
Find ADFS servers associated with apex domain:
msprobe adfs acme.com Find RD Web servers associated with apex domain with verbose output:
msprobe rdp acme.com -v Find all Microsoft products hostsed on-prem for a domain:
msprobe full acme.com What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…