{"uuid": "884af9ce-4966-4303-ab10-e6fbcedc845f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-44487", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9183", "content": "#tools\n#Blue_Team_Techniques\n1. Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487\nhttps://github.com/bcdannyboy/CVE-2023-44487\n2. An Algorithm to Detect Hosting Providers/IP Ranges\nhttps://ipapi.is/blog/detecting-hosting-providers.html\n3. Tool for MSSQL relay audit and abuse\nhttps://github.com/CompassSecurity/mssqlrelay\n]-&gt; https://blog.compass-security.com/2023/10/relaying-ntlm-to-mssql", "creation_timestamp": "2023-10-12T11:00:38.000000Z"}