forked from webvul/Against-Exchange-OWA-Hacking
-
Notifications
You must be signed in to change notification settings - Fork 0
nick-tang/Against-Exchange-OWA-Hacking
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
# Against-Exchange-OWA-Hacking Read first, You can adjust thresholds in the script, too strict values could cause wrong blocking impact normal use. If you want remove some IP from block, you can remove the rule from windows firewall, or, add the ip address to FW_WhiteList.txt as |supper format temporaily, see FW_WhiteList.txt for more. Deploy this script on every CAS serving internet # How to use 1 This is a script to protect your AD passwords from hacking over Exchange OWA if your exchange mailboxes are attacking by someone over a internet published OWA url, probably this script can save u 2 Wrote by larry.song@outlook.com with powershell based on Windows 2012 R2 standard 3 Change your powershell execution policy to "RemoteSigned" via cmdlet "Set-ExecutionPolicy -ExecutionPolicy RemoteSigned" - To allow the script run 4 Enable audit logging for your CAS servers via GPO - To log 4625 events 5 Enable Windows firewall - To block attacker's IP addresses 6 Set "Starter.cmd" invoked by task scheduler every 1 minute - Larry.Song@outlook.com
About
This is a script to protect your AD passwords from hacking over Exchange OWA
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published
Languages
- PowerShell 99.1%
- Batchfile 0.9%