Discovering and securing on-premises Microsoft solutions is paramount in today’s cybersecurity landscape.
In this article, we delve into ‘msprobe,’ a powerful tool designed to aid in the identification of on-prem Microsoft products.
With its versatile modules, ‘msprobe’ empowers security professionals to pinpoint and assess potential vulnerabilities, ensuring robust protection for organizations.
Finding all things on-prem Microsoft for password spraying and enumeration.
The tool will used a list of common subdomains associated with your target apex domain to attempt to discover valid instances of on-prem Microsoft solutions. Screenshots of the tool in action are below:
Install the project using pipx
pipx install git+https://github.com/puzzlepeaches/msprobe.git
The tool has four different modules that assist with the discovery of on-prem Microsoft products:
The help menu and supported modules are shown below:
Usage: msprobe [OPTIONS] COMMAND [ARGS]...
Find Microsoft Exchange, RD Web, ADFS, and Skype instances
Options:
--help Show this message and exit.
Commands:
adfs Find Microsoft ADFS servers
exch Find Microsoft Exchange servers
full Find all Microsoft supported by msprobe
rdp Find Microsoft RD Web servers
skype Find Microsoft Skype servers
Find ADFS servers associated with apex domain:
msprobe adfs acme.com
Find RD Web servers associated with apex domain with verbose output:
msprobe rdp acme.com -v
Find all Microsoft products hostsed on-prem for a domain:
msprobe full acme.com
Kali Linux 2024.4, the final release of 2024, brings a wide range of updates and…
This Go program applies a lifetime patch to PowerShell to disable ETW (Event Tracing for…
GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory…
Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders…
The free and open-source security platform SecHub, provides a central API to test software with…
Don't worry if there are any bugs in the tool, we will try to fix…