{"id":22168,"date":"2022-02-26T15:02:52","date_gmt":"2022-02-26T15:02:52","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=22168"},"modified":"2022-02-26T15:02:55","modified_gmt":"2022-02-26T15:02:55","slug":"msmailprobe","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/msmailprobe\/","title":{"rendered":"Msmailprobe : Office 365 And Exchange Enumeration"},"content":{"rendered":"\n<p><strong>Msmailprobe<\/strong> is widely known that OWA (Outlook Web app) is vulnerable to time-based user enumeration attacks. This tool leverages all known, and even some lesser-known services exposed by default Exchange installations to enumerate users. It also targets Office 365 for error-based user enumeration.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/busterb\/msmailprobe#getting-started\"><\/a><strong>Getting Started<\/strong><\/p>\n\n\n\n<p>If you want to download and compile the simple, non-dependant code, you must first install GoLang! I will let the incredible documentation, and other online resources help you with this task.<\/p>\n\n\n\n<p>https:\/\/golang.org\/doc\/install<\/p>\n\n\n\n<p>You may also download the compiled release&nbsp;here.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/busterb\/msmailprobe#syntax\"><\/a><strong>Syntax<\/strong><\/p>\n\n\n\n<p>List examples of commands for this applications, but simply running the binary with the&nbsp;<code><strong>examples<\/strong><\/code>&nbsp;command:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>.\/msmailprobe examples<\/strong><\/p>\n\n\n\n<p>You can also get more specific help by running the binary with the arguments you are interested in:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>.\/msmailprobe identify<br>.\/msmailprobe userenum<br>.\/msmailprobe userenum &#8211;onprem<br>.\/msmailprobe userenum &#8211;o365<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Usage<\/strong><\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/busterb\/msmailprobe#identify-command\"><\/a><strong>Identify Command<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Used for gathering information about a host that may be pointed towards an Exchange or o365 tied domain<\/li><li>Queries for specific DNS records related to Office 365 integration<\/li><li>Attempts to extract internal domain name for onprem instance of Exchange<\/li><li>Identifies services vulnerable to time-based user enumeration for onprem Exchange<\/li><li>Lists password-sprayable services exposed for onprem Exchange host<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>Flag to use:<br>-t to specify target host<br>Example:<br>.\/msmailprobe identify -t mail.target.com<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Userenum (o365) Command<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Error-based user enumeration for Office 365 integrated email addresses<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>Flags to use:<br>-E for email list OR -e for single email address<br>-o [optional]to specify an out file for valid emails identified<br>&#8211;threads [optional] for setting amount of requests to be made concurrently<br>Examples:<br>.\/msmailprobe userenum &#8211;o365 -E emailList.txt -o validemails.txt &#8211;threads 25<br>.\/msmailprobe userenum &#8211;o365 -e admin@target.com<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Userenum (onprem) Command<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Time-based user enumeration against multiple onprem Exchange services<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>Flags to use:<br>-t to specify target host<br>-U for user list OR -u for single username<br>-o [optional]to specify an out file for valid users identified<br>&#8211;threads [optional] for setting amount of requests to be made concurrently<br>Examples:<br>.\/msmailprobe userenum &#8211;onprem -t mail.target.com -U userList.txt -o validusers.txt &#8211;threads 25<br>.\/msmailprobe userenum &#8211;onprem -t mail.target.com -u admin<\/strong><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/busterb\/msmailprobe\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Msmailprobe is widely known that OWA (Outlook Web app) is vulnerable to time-based user enumeration attacks. This tool leverages all known, and even some lesser-known services exposed by default Exchange installations to enumerate users. It also targets Office 365 for error-based user enumeration. Getting Started If you want to download and compile the simple, non-dependant [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":22188,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj3WRq4W3D6SPaxeLwuogFTtum5IDf1jPH31wRO1Dp0ovNRAdIqJk9DNxYB0pz4QtUP_Bd5Sh41zdBL_r-tjYn7VbryVIu5MZ6OybhMUayQ7J1m5RKPVtj-_bh8LNTlUCJjeGoVZkOYGjxm1UEdaZookNhZ5DrxZIaLQxh8QfWUh8tlP4X7EG3mg6H2=s707","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[4746,4745,2304],"class_list":["post-22168","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-exchange-enumeration","tag-msmailprobe","tag-office-365"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Msmailprobe : Office 365 And Exchange Enumeration<\/title>\n<meta name=\"description\" content=\"Msmailprobe is widely known that OWA (Outlook Web app) is vulnerable to time-based user enumeration attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/msmailprobe\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Msmailprobe : Office 365 And Exchange Enumeration\" \/>\n<meta property=\"og:description\" content=\"Msmailprobe is widely known that OWA (Outlook Web app) is vulnerable to time-based user enumeration attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/msmailprobe\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-26T15:02:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-26T15:02:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj3WRq4W3D6SPaxeLwuogFTtum5IDf1jPH31wRO1Dp0ovNRAdIqJk9DNxYB0pz4QtUP_Bd5Sh41zdBL_r-tjYn7VbryVIu5MZ6OybhMUayQ7J1m5RKPVtj-_bh8LNTlUCJjeGoVZkOYGjxm1UEdaZookNhZ5DrxZIaLQxh8QfWUh8tlP4X7EG3mg6H2=s707\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj3WRq4W3D6SPaxeLwuogFTtum5IDf1jPH31wRO1Dp0ovNRAdIqJk9DNxYB0pz4QtUP_Bd5Sh41zdBL_r-tjYn7VbryVIu5MZ6OybhMUayQ7J1m5RKPVtj-_bh8LNTlUCJjeGoVZkOYGjxm1UEdaZookNhZ5DrxZIaLQxh8QfWUh8tlP4X7EG3mg6H2=s707\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/msmailprobe\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/msmailprobe\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Msmailprobe : Office 365 And Exchange Enumeration\",\"datePublished\":\"2022-02-26T15:02:52+00:00\",\"dateModified\":\"2022-02-26T15:02:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/msmailprobe\/\"},\"wordCount\":347,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/msmailprobe\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj3WRq4W3D6SPaxeLwuogFTtum5IDf1jPH31wRO1Dp0ovNRAdIqJk9DNxYB0pz4QtUP_Bd5Sh41zdBL_r-tjYn7VbryVIu5MZ6OybhMUayQ7J1m5RKPVtj-_bh8LNTlUCJjeGoVZkOYGjxm1UEdaZookNhZ5DrxZIaLQxh8QfWUh8tlP4X7EG3mg6H2=s707\",\"keywords\":[\"Exchange Enumeration\",\"Msmailprobe\",\"office 365\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/msmailprobe\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/msmailprobe\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/msmailprobe\/\",\"name\":\"Msmailprobe : Office 365 And Exchange Enumeration\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/msmailprobe\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/msmailprobe\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj3WRq4W3D6SPaxeLwuogFTtum5IDf1jPH31wRO1Dp0ovNRAdIqJk9DNxYB0pz4QtUP_Bd5Sh41zdBL_r-tjYn7VbryVIu5MZ6OybhMUayQ7J1m5RKPVtj-_bh8LNTlUCJjeGoVZkOYGjxm1UEdaZookNhZ5DrxZIaLQxh8QfWUh8tlP4X7EG3mg6H2=s707\",\"datePublished\":\"2022-02-26T15:02:52+00:00\",\"dateModified\":\"2022-02-26T15:02:55+00:00\",\"description\":\"Msmailprobe is widely known that OWA (Outlook Web app) is vulnerable to time-based user enumeration attacks.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/msmailprobe\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/msmailprobe\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj3WRq4W3D6SPaxeLwuogFTtum5IDf1jPH31wRO1Dp0ovNRAdIqJk9DNxYB0pz4QtUP_Bd5Sh41zdBL_r-tjYn7VbryVIu5MZ6OybhMUayQ7J1m5RKPVtj-_bh8LNTlUCJjeGoVZkOYGjxm1UEdaZookNhZ5DrxZIaLQxh8QfWUh8tlP4X7EG3mg6H2=s707\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj3WRq4W3D6SPaxeLwuogFTtum5IDf1jPH31wRO1Dp0ovNRAdIqJk9DNxYB0pz4QtUP_Bd5Sh41zdBL_r-tjYn7VbryVIu5MZ6OybhMUayQ7J1m5RKPVtj-_bh8LNTlUCJjeGoVZkOYGjxm1UEdaZookNhZ5DrxZIaLQxh8QfWUh8tlP4X7EG3mg6H2=s707\",\"width\":\"707\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Msmailprobe : Office 365 And Exchange Enumeration","description":"Msmailprobe is widely known that OWA (Outlook Web app) is vulnerable to time-based user enumeration attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/msmailprobe\/","og_locale":"en_US","og_type":"article","og_title":"Msmailprobe : Office 365 And Exchange Enumeration","og_description":"Msmailprobe is widely known that OWA (Outlook Web app) is vulnerable to time-based user enumeration attacks.","og_url":"https:\/\/kalilinuxtutorials.com\/msmailprobe\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2022-02-26T15:02:52+00:00","article_modified_time":"2022-02-26T15:02:55+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj3WRq4W3D6SPaxeLwuogFTtum5IDf1jPH31wRO1Dp0ovNRAdIqJk9DNxYB0pz4QtUP_Bd5Sh41zdBL_r-tjYn7VbryVIu5MZ6OybhMUayQ7J1m5RKPVtj-_bh8LNTlUCJjeGoVZkOYGjxm1UEdaZookNhZ5DrxZIaLQxh8QfWUh8tlP4X7EG3mg6H2=s707","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj3WRq4W3D6SPaxeLwuogFTtum5IDf1jPH31wRO1Dp0ovNRAdIqJk9DNxYB0pz4QtUP_Bd5Sh41zdBL_r-tjYn7VbryVIu5MZ6OybhMUayQ7J1m5RKPVtj-_bh8LNTlUCJjeGoVZkOYGjxm1UEdaZookNhZ5DrxZIaLQxh8QfWUh8tlP4X7EG3mg6H2=s707","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/msmailprobe\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/msmailprobe\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Msmailprobe : Office 365 And Exchange Enumeration","datePublished":"2022-02-26T15:02:52+00:00","dateModified":"2022-02-26T15:02:55+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/msmailprobe\/"},"wordCount":347,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/msmailprobe\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj3WRq4W3D6SPaxeLwuogFTtum5IDf1jPH31wRO1Dp0ovNRAdIqJk9DNxYB0pz4QtUP_Bd5Sh41zdBL_r-tjYn7VbryVIu5MZ6OybhMUayQ7J1m5RKPVtj-_bh8LNTlUCJjeGoVZkOYGjxm1UEdaZookNhZ5DrxZIaLQxh8QfWUh8tlP4X7EG3mg6H2=s707","keywords":["Exchange Enumeration","Msmailprobe","office 365"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/msmailprobe\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/msmailprobe\/","url":"https:\/\/kalilinuxtutorials.com\/msmailprobe\/","name":"Msmailprobe : Office 365 And Exchange Enumeration","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/msmailprobe\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/msmailprobe\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj3WRq4W3D6SPaxeLwuogFTtum5IDf1jPH31wRO1Dp0ovNRAdIqJk9DNxYB0pz4QtUP_Bd5Sh41zdBL_r-tjYn7VbryVIu5MZ6OybhMUayQ7J1m5RKPVtj-_bh8LNTlUCJjeGoVZkOYGjxm1UEdaZookNhZ5DrxZIaLQxh8QfWUh8tlP4X7EG3mg6H2=s707","datePublished":"2022-02-26T15:02:52+00:00","dateModified":"2022-02-26T15:02:55+00:00","description":"Msmailprobe is widely known that OWA (Outlook Web app) is vulnerable to time-based user enumeration attacks.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/msmailprobe\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/msmailprobe\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj3WRq4W3D6SPaxeLwuogFTtum5IDf1jPH31wRO1Dp0ovNRAdIqJk9DNxYB0pz4QtUP_Bd5Sh41zdBL_r-tjYn7VbryVIu5MZ6OybhMUayQ7J1m5RKPVtj-_bh8LNTlUCJjeGoVZkOYGjxm1UEdaZookNhZ5DrxZIaLQxh8QfWUh8tlP4X7EG3mg6H2=s707","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj3WRq4W3D6SPaxeLwuogFTtum5IDf1jPH31wRO1Dp0ovNRAdIqJk9DNxYB0pz4QtUP_Bd5Sh41zdBL_r-tjYn7VbryVIu5MZ6OybhMUayQ7J1m5RKPVtj-_bh8LNTlUCJjeGoVZkOYGjxm1UEdaZookNhZ5DrxZIaLQxh8QfWUh8tlP4X7EG3mg6H2=s707","width":"707","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj3WRq4W3D6SPaxeLwuogFTtum5IDf1jPH31wRO1Dp0ovNRAdIqJk9DNxYB0pz4QtUP_Bd5Sh41zdBL_r-tjYn7VbryVIu5MZ6OybhMUayQ7J1m5RKPVtj-_bh8LNTlUCJjeGoVZkOYGjxm1UEdaZookNhZ5DrxZIaLQxh8QfWUh8tlP4X7EG3mg6H2=s707","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":34646,"url":"https:\/\/kalilinuxtutorials.com\/graphpython\/","url_meta":{"origin":22168,"position":0},"title":"Graphpython &#8211; A Comprehensive Tool For Microsoft Graph API Enumeration And Exploitation","author":"Varshini","date":"August 29, 2024","format":false,"excerpt":"Graphpython is a modular Python tool for cross-platform Microsoft Graph API enumeration and exploitation. It builds upon the capabilities of AADInternals (Killchain.ps1), GraphRunner, and TokenTactics(V2) to provide a comprehensive solution for interacting with the Microsoft Graph API for red team and cloud assumed breach operations. Graphpython covers external reconnaissance, authentication\/token\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhXQGUGEw4T4AvFPH9WgjrG1wLpT3lxNDbZwMUpaBLubd0Pc8zhRGXiUr3RrgEU21x1THWxieu-BNw1nVeVtpulh2QQYdaZNZCH3NQPXsCYAAVsrMvbq1ph1oBhMfpxEphrE8QBfCsEXP9HFqQSD3Ve0XlkIB5cQvJXPl0S-dxA-sU_RxtA_KVGmJ2bhq5z\/s16000\/Graphpython%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhXQGUGEw4T4AvFPH9WgjrG1wLpT3lxNDbZwMUpaBLubd0Pc8zhRGXiUr3RrgEU21x1THWxieu-BNw1nVeVtpulh2QQYdaZNZCH3NQPXsCYAAVsrMvbq1ph1oBhMfpxEphrE8QBfCsEXP9HFqQSD3Ve0XlkIB5cQvJXPl0S-dxA-sU_RxtA_KVGmJ2bhq5z\/s16000\/Graphpython%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhXQGUGEw4T4AvFPH9WgjrG1wLpT3lxNDbZwMUpaBLubd0Pc8zhRGXiUr3RrgEU21x1THWxieu-BNw1nVeVtpulh2QQYdaZNZCH3NQPXsCYAAVsrMvbq1ph1oBhMfpxEphrE8QBfCsEXP9HFqQSD3Ve0XlkIB5cQvJXPl0S-dxA-sU_RxtA_KVGmJ2bhq5z\/s16000\/Graphpython%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhXQGUGEw4T4AvFPH9WgjrG1wLpT3lxNDbZwMUpaBLubd0Pc8zhRGXiUr3RrgEU21x1THWxieu-BNw1nVeVtpulh2QQYdaZNZCH3NQPXsCYAAVsrMvbq1ph1oBhMfpxEphrE8QBfCsEXP9HFqQSD3Ve0XlkIB5cQvJXPl0S-dxA-sU_RxtA_KVGmJ2bhq5z\/s16000\/Graphpython%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhXQGUGEw4T4AvFPH9WgjrG1wLpT3lxNDbZwMUpaBLubd0Pc8zhRGXiUr3RrgEU21x1THWxieu-BNw1nVeVtpulh2QQYdaZNZCH3NQPXsCYAAVsrMvbq1ph1oBhMfpxEphrE8QBfCsEXP9HFqQSD3Ve0XlkIB5cQvJXPl0S-dxA-sU_RxtA_KVGmJ2bhq5z\/s16000\/Graphpython%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhXQGUGEw4T4AvFPH9WgjrG1wLpT3lxNDbZwMUpaBLubd0Pc8zhRGXiUr3RrgEU21x1THWxieu-BNw1nVeVtpulh2QQYdaZNZCH3NQPXsCYAAVsrMvbq1ph1oBhMfpxEphrE8QBfCsEXP9HFqQSD3Ve0XlkIB5cQvJXPl0S-dxA-sU_RxtA_KVGmJ2bhq5z\/s16000\/Graphpython%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":21589,"url":"https:\/\/kalilinuxtutorials.com\/o365spray\/","url_meta":{"origin":22168,"position":1},"title":"O365Spray : Username Enumeration And Password Spraying Tool Aimed At Microsoft O365","author":"R K","date":"February 8, 2022","format":false,"excerpt":"O365Spray a username enumeration and password spraying tool aimed at Microsoft Office 365 (O365). This tool reimplements a collection of enumeration and spray techniques researched and identified by those mentioned in\u00a0Acknowledgments. WARNING: The oAuth2 module for user enumeration is performed by submitting a single authentication attempt per user. If the\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgExwkx3MgetHcJpFVm2-6fORYK5Ljk580sAnt7-ErhE23BHgRRJwjyqKMdaUR0pHJUw5X_2i3J6O5Qws6QF0eu8K4tl6sI9PYmNRyq3DHg5zJevmJyasLod45lyXhvNjnbFG0wJMcxustznYCMXtZQNTPJ19ssI4brVIXb8Mn5O7EjNqtogDVIAoUT=s755","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgExwkx3MgetHcJpFVm2-6fORYK5Ljk580sAnt7-ErhE23BHgRRJwjyqKMdaUR0pHJUw5X_2i3J6O5Qws6QF0eu8K4tl6sI9PYmNRyq3DHg5zJevmJyasLod45lyXhvNjnbFG0wJMcxustznYCMXtZQNTPJ19ssI4brVIXb8Mn5O7EjNqtogDVIAoUT=s755 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgExwkx3MgetHcJpFVm2-6fORYK5Ljk580sAnt7-ErhE23BHgRRJwjyqKMdaUR0pHJUw5X_2i3J6O5Qws6QF0eu8K4tl6sI9PYmNRyq3DHg5zJevmJyasLod45lyXhvNjnbFG0wJMcxustznYCMXtZQNTPJ19ssI4brVIXb8Mn5O7EjNqtogDVIAoUT=s755 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgExwkx3MgetHcJpFVm2-6fORYK5Ljk580sAnt7-ErhE23BHgRRJwjyqKMdaUR0pHJUw5X_2i3J6O5Qws6QF0eu8K4tl6sI9PYmNRyq3DHg5zJevmJyasLod45lyXhvNjnbFG0wJMcxustznYCMXtZQNTPJ19ssI4brVIXb8Mn5O7EjNqtogDVIAoUT=s755 2x"},"classes":[]},{"id":6037,"url":"https:\/\/kalilinuxtutorials.com\/weebdns-dns-enumeration-asynchronicity\/","url_meta":{"origin":22168,"position":2},"title":"Weebdns : DNS Enumeration with Asynchronicity","author":"R K","date":"August 3, 2019","format":false,"excerpt":"WeebDNS is a DNS Enumeration Tool with Asynchronicity. DISCLAIMER: This is only for testing purposes and can only be used where strict consent has been given. Do not use this for illegal purposes, period. Features It is an 'Asynchronous' DNS Enumeration Tool made with Python3 which makes it much faster\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":15173,"url":"https:\/\/kalilinuxtutorials.com\/teamsuserenum\/","url_meta":{"origin":22168,"position":3},"title":"TeamsUserEnum : User Enumeration With Microsoft Teams API","author":"R K","date":"July 27, 2021","format":false,"excerpt":"TeamsUserEnum, sometimes user enumeration could be sometimes useful during the reconnaissance of an assessment. This tool will determine if an email is registered on teams or not. More details on the\u00a0immunIT's blog. Microsoft Teams User Enumeration The pandemic has increased the use of collaborative tools. Microsoft Teams is no exception:\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":36658,"url":"https:\/\/kalilinuxtutorials.com\/msftrecon\/","url_meta":{"origin":22168,"position":4},"title":"MSFTRecon : A Powerful Reconnaissance Tool For Microsoft 365 And Azure","author":"Varshini","date":"February 24, 2025","format":false,"excerpt":"MSFTRecon is a specialized reconnaissance tool designed for red teamers and security professionals to map and analyze Microsoft 365 and Azure tenant infrastructures. Its primary focus is on identifying potential security misconfigurations and attack vectors without requiring authentication, making it an invaluable asset for penetration testing and security assessments. Key\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/MSFTRecon-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/MSFTRecon-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/MSFTRecon-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/MSFTRecon-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/MSFTRecon-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/MSFTRecon-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":35094,"url":"https:\/\/kalilinuxtutorials.com\/slackenum\/","url_meta":{"origin":22168,"position":5},"title":"SlackEnum &#8211; Mastering User Enumeration On Slack","author":"Varshini","date":"October 7, 2024","format":false,"excerpt":"A specialized tool designed for user enumeration on the Slack platform. This powerful utility aids in identifying active users within a Slack workspace, enhancing both security testing and network analysis. Learn how to set up and deploy SlackEnum effectively with our step-by-step guide. Setup Clone this repository and install the\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgyZX1mc8BHnTkjyWvBy8MQNgQnXBHA2uicDEujEAjs13-ZVlICiVJ_o1PK5tYxUpLa8tSbxI_gniiOlLa9iOgovBeF3PDZPDte0np2Sf0P7_baEFWOSQlReA5SB8jswZRl5LXonGCGgKvwswHUZb4CA2aFWS4r6cZmb690xKKp3JEg6A4Q4fOhLOkZaWFD\/s1600\/SlackEnum%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgyZX1mc8BHnTkjyWvBy8MQNgQnXBHA2uicDEujEAjs13-ZVlICiVJ_o1PK5tYxUpLa8tSbxI_gniiOlLa9iOgovBeF3PDZPDte0np2Sf0P7_baEFWOSQlReA5SB8jswZRl5LXonGCGgKvwswHUZb4CA2aFWS4r6cZmb690xKKp3JEg6A4Q4fOhLOkZaWFD\/s1600\/SlackEnum%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgyZX1mc8BHnTkjyWvBy8MQNgQnXBHA2uicDEujEAjs13-ZVlICiVJ_o1PK5tYxUpLa8tSbxI_gniiOlLa9iOgovBeF3PDZPDte0np2Sf0P7_baEFWOSQlReA5SB8jswZRl5LXonGCGgKvwswHUZb4CA2aFWS4r6cZmb690xKKp3JEg6A4Q4fOhLOkZaWFD\/s1600\/SlackEnum%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgyZX1mc8BHnTkjyWvBy8MQNgQnXBHA2uicDEujEAjs13-ZVlICiVJ_o1PK5tYxUpLa8tSbxI_gniiOlLa9iOgovBeF3PDZPDte0np2Sf0P7_baEFWOSQlReA5SB8jswZRl5LXonGCGgKvwswHUZb4CA2aFWS4r6cZmb690xKKp3JEg6A4Q4fOhLOkZaWFD\/s1600\/SlackEnum%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgyZX1mc8BHnTkjyWvBy8MQNgQnXBHA2uicDEujEAjs13-ZVlICiVJ_o1PK5tYxUpLa8tSbxI_gniiOlLa9iOgovBeF3PDZPDte0np2Sf0P7_baEFWOSQlReA5SB8jswZRl5LXonGCGgKvwswHUZb4CA2aFWS4r6cZmb690xKKp3JEg6A4Q4fOhLOkZaWFD\/s1600\/SlackEnum%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgyZX1mc8BHnTkjyWvBy8MQNgQnXBHA2uicDEujEAjs13-ZVlICiVJ_o1PK5tYxUpLa8tSbxI_gniiOlLa9iOgovBeF3PDZPDte0np2Sf0P7_baEFWOSQlReA5SB8jswZRl5LXonGCGgKvwswHUZb4CA2aFWS4r6cZmb690xKKp3JEg6A4Q4fOhLOkZaWFD\/s1600\/SlackEnum%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/22168","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=22168"}],"version-history":[{"count":10,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/22168\/revisions"}],"predecessor-version":[{"id":22187,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/22168\/revisions\/22187"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/22188"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=22168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=22168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=22168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}