ToolShell Tango: SharePoint’s Cybersecurity Showdown of 2025
In July 2025, the Microsoft SharePoint exploit chain ToolShell took the stage, exploiting deserialization and authentication bypass vulnerabilities. This article dives into the hunt for in-memory ToolShell payloads using tools like Zeek and Wireshark, decoding the complex layers of cyber mischief lurking in vulnerable SharePoint servers.

Hot Take:
Who knew SharePoint could be the life of the party? With exploits like ToolShell, it’s not just a document management tool anymore; it’s a full-on hacker hangout! Just when you thought it was safe to leave your office files alone, here comes a new way to crash the server room. Keep your packets tight and your defenses tighter, because these new in-memory payloads are the ninjas of the cyber world, stealthily bypassing your EDR with the grace of a cat burglar.
Key Points:
- ToolShell exploit chain targets Microsoft SharePoint with vulnerabilities CVE-2025-53770 and CVE-2025-53771.
- Hackers evolved from web shell uploads to in-memory payloads, making detection harder.
- The hunt involves tools like Zeek, DaemonLogger, and Wireshark to track malicious activities.
- Decoded payloads reveal malicious .NET DLLs and encoded PowerShell commands.
- Security scanners and specific templates can detect these exploits with varying success.
