Hacking Exposed Webinar: Inside the Microsoft Exchange/Proxy Logon Hack
We invite you to learn more about the HAFNIUM attacks by viewing a special two-part, on-demand Hacking Exposed presentation by Brian Robison, BlackBerry Chief Evangelist and Senior Director of Product Marketing.
In Part One, Brian deconstructs:
The four Exchange Server vulnerabilities exploited by HAFNIUM
The scripts and commands used by HAFNIUM for each step of the attack chain.
Common post-exploitation strategies by HAFNIUM and other advanced threat groups.
In Part Two, Brian moves into the lab to demonstrate two different versions of the HAFNIUM attack chain. In his first demonstration, Brian installs a web shell on the compromised Exchange Server, which enables an attacker to remotely execute commands with system-level privileges. The attack chain is based on the Proof of Concept (POC) exploit released in January 2021.
In the second demonstration, Brian shows how to implement the exploit as a command and control (C2) server, and utilize tools like ProcDump, FTP, and Pypykatz to harvest domain credentials from compromised Exchange Servers.
Don’t miss this essential Hacking Exposed security briefing!
Watch now!
by BlackBerry
linux ftp server