Zeroska
Ctrlk
  • 🐱Zeroska - The Bold
  • Computer/Cyber Security
    • ⭐Fresh off the boat - for new Blue Teamer/ SOC Analyst
    • 💀Necromancer (DFIR)
    • 🧙‍♂️Defense Witchcraft
      • Data Analysis as a Defender
      • Active Directory
      • Windows Event Logs
      • MS Exchange
      • Windows
    • 💙My Current Blue Team Operation
    • 🏭ICS/OT
    • 🥷Threat Intelligence
  • 😒Computer and Technology
    • My Home Lab Setup
    • 🐴ELK Stack
    • 🐧Linux
    • 📦Containers
    • 🪠Splunk Learning Experience
  • Threat Hunting
    • Hunting for Implant
    • Using STRIDE and DREAD
    • 🐳Predators and Preys (Computing)
    • 📦Network Packet Analysis
    • Grep | Powershell Search | Regex
    • Hunting Resources
  • 🎵In my remains
    • Choices
    • The Art of Facing Unknown Problems
    • Build the best DFIR team
    • Reverse Engineering - Đồ án hướng ngành A "Hụt" của tôi
Powered by GitBook
On this page
  1. Computer/Cyber Security
  2. 🧙‍♂️Defense Witchcraft

MS Exchange

Refs (Blogs and Books Related to MS Exchange)
  • https://blog.viettelcybersecurity.com/deep-understand-aspx-file-handling-and-some-related-attack-vector/ (IIS file handling)

  • https://blog.orange.tw/2021/08/proxylogon-a-new-attack-surface-on-ms-exchange-part-1.html (Orange Tsai God Blog about IIS, talk about Exchange and IIS architecture)

  • https://github.com/orangetw/My-Presentation-Slides/blob/main/data/2021-The-Proxy-Era-Of-Microsoft-Exchange-Server.pdf

  • https://swarm.ptsecurity.com/attacking-ms-exchange-web-interfaces/

PreviousAuthentication (Windows Account Life Cycle Events)NextWindows

Last updated 2 years ago

Was this helpful?

Was this helpful?