CVE-2020-0688 modified exploit for Exchange 2010 The main issue with Exchange2010 that it's .net 2.0 based and generic deserialization gadgets do not work.
All credits goes to zcgonvh and EazyLov3.
The project is just a combination of:
* https://github.com/zcgonvh/CVE-2020-0688/
* https://www.buaq.net/go-41757.html
How to execute:
* compile
* run Exch2010.exe 192.168.68.110 domain\user P@ssw0rd
* run ExchangeCmd.exe 192.168.68.110 domain\user P@ssw0rd
[4.0K] /data/pocs/aaa286eb940c186e6beca91e6bbd420cd8405f23
├── [9.0K] Exch2010.cs
├── [121K] ExchangeCmd.cs
└── [ 423] README.md
0 directories, 3 files