Discovering and securing on-premises Microsoft solutions is paramount in today’s cybersecurity landscape.
In this article, we delve into ‘msprobe,’ a powerful tool designed to aid in the identification of on-prem Microsoft products.
With its versatile modules, ‘msprobe’ empowers security professionals to pinpoint and assess potential vulnerabilities, ensuring robust protection for organizations.
Finding all things on-prem Microsoft for password spraying and enumeration.
The tool will used a list of common subdomains associated with your target apex domain to attempt to discover valid instances of on-prem Microsoft solutions. Screenshots of the tool in action are below:
Install the project using pipx
pipx install git+https://github.com/puzzlepeaches/msprobe.git
The tool has four different modules that assist with the discovery of on-prem Microsoft products:
The help menu and supported modules are shown below:
Usage: msprobe [OPTIONS] COMMAND [ARGS]...
Find Microsoft Exchange, RD Web, ADFS, and Skype instances
Options:
--help Show this message and exit.
Commands:
adfs Find Microsoft ADFS servers
exch Find Microsoft Exchange servers
full Find all Microsoft supported by msprobe
rdp Find Microsoft RD Web servers
skype Find Microsoft Skype servers
Find ADFS servers associated with apex domain:
msprobe adfs acme.com
Find RD Web servers associated with apex domain with verbose output:
msprobe rdp acme.com -v
Find all Microsoft products hostsed on-prem for a domain:
msprobe full acme.com
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…