https://github.com/badboycxcc/Exchange-UserBrute
Exchange 用户名爆破
https://github.com/badboycxcc/Exchange-UserBrute
Last synced: 27 days ago
JSON representation
Exchange 用户名爆破
- Host: GitHub
- URL: https://github.com/badboycxcc/Exchange-UserBrute
- Owner: badboycxcc
- Created: 2024-09-21T02:05:25.000Z (about 1 year ago)
- Default Branch: main
- Last Pushed: 2025-01-04T04:48:21.000Z (11 months ago)
- Last Synced: 2025-01-04T05:18:05.435Z (11 months ago)
- Homepage:
- Size: 1.49 MB
- Stars: 2
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - badboycxcc/Exchange-UserBrute - Exchange 用户名爆破 (Others)
README
# Exchange-UserBrute
Exchange 用户名爆破
## 使用方法

**参数**
```
Usage of ./ExchangeUserBrute-linux-arm64:
-b int
爆破类型, 1 延时爆破 2 Cookie爆破 (default 1)
-email string
邮箱后缀, Cookie爆破必要参数
-name string
用户名
-t int
线程数 (default 5)
-u string
目标URL
-uf string
用户名列表文件
```
**延时爆破方法:验证单个域用户**
```
ExchangeUserBrute -u https://main.test.com -name Administrator
```

**延时爆破方法:批量验证域用户**
```
ExchangeUserBrute -u https://main.test.com -uf user.txt
```

**Cookie 爆破方法:验证单个邮箱**
```
ExchangeUserBrute -u https://main.test.com -name Administrator -b 2 -email test.com
```

**Cookie 爆破方法:批量验证邮箱**
```
ExchangeUserBrute -u https://main.test.com -uf user.txt -b 2 -email test.com
```

> Cookie 爆破方法参考

X.com:[@_mohemiv](https://x.com/_mohemiv)
PPT: https://static.ptsecurity.com/events/exch-vietnam.pdf
**延时爆破与Cookie 爆破优缺点**
```
延时爆破
- 速度较慢
- 准确率不高
- 验证域用户
Cookie 爆破
- 速度更快
- 准确度更高
- 只能验证邮箱
```
**延时爆破与Cookie 爆破时间对比**
延时爆破:30个用户,用时27.31秒

Cookie 爆破:30个用户,用时4.47秒

**延时爆破和Cookie 爆破结果不一致问题**
```
延时爆破验证的是域用户,不是每个域用户都会开启邮箱。
```
## 更新日志
```
2025-01-04 v1.1 T00ls 专版
[+] 增加终端彩色输出
[+] 增加邮箱验证方法,速度更快。
2024-09-21 v1.0
[u] 第一个版本
```
## 原理及参考项目
- https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/msmail/onprem_enum.go