Skip to content

Latest commit

 

History

History
24 lines (15 loc) · 955 Bytes

README.md

File metadata and controls

24 lines (15 loc) · 955 Bytes

chkwebshell.ps1

Detect malicious code on Exchange Server which could compromise the system, this after exploitation of Hafnium webshell injection.

PowerShell Script to Search for Forensic Artifacts.

Preface

The purpose to provide the possibility to quickly identify potentially injection of webshells like hafnium. Detect malicious code on Exchange Server which could compromise the system, this after exploitation of Hafnium webshell injection.

Run on Exchange Server Verion 2013/2016/2019 to Detect Hafnium webshells are present:

Run the Script

On a Windows Server 2012 R2 or 2016/2019 with Exchange Server in PowerShell 3.0 or newer.

PS1 C:\>.\chkwebshell.ps1

Addendum

This script is intentional developed in not very structured way, so it is simply to modify individual lines or omit them altogether, it should be easily customizable.

license

chkwebshell.ps1 is licensed under the GNU General Public License v3.0.