http://torzcd47rw4qh36g4yqxvv2tmifgmu6jjalkyqz4e4lzzwtfdfc7qaqd.onion/how-to-hack-an-unpatched-exchange-server-with-rogue-powershell-code-naked-security/index.html
In theory, only safe or low-risk objects can be created remotely via PowerShell, so that instantiating our imaginary TextString above, or a SimpleIntegerValue , might be considered acceptable, while a ConnectedTCPClient or a RunCmdAndReadOutput would definitely not be. But the ZDI researchers notice that before triggered the last step, they could do this: STEP 3. Remotely trick Exchange into thinking that a low-risk object that’s passed the safety test is, in fact, some...