{"id":1905,"date":"2009-05-21T18:42:50","date_gmt":"2009-05-21T16:42:50","guid":{"rendered":"http:\/\/www.corelan.be:8800\/index.php\/2009\/05\/21\/delegating-exchange-2007-distribution-list-management-to-end-users\/"},"modified":"2009-05-21T18:42:50","modified_gmt":"2009-05-21T16:42:50","slug":"delegating-exchange-2007-distribution-list-management-to-end-users","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2009\/05\/21\/delegating-exchange-2007-distribution-list-management-to-end-users\/","title":{"rendered":"Delegating Exchange 2007 Distribution List Management to End Users"},"content":{"rendered":"<p>One of the challenges that result from operating a messaging environment is making sure the company\u2019s internal Distribution Lists stay up to date.&#160; In most corporate environments, this is a task that is typically assigned to IT staff, however it does not have to be like this.&#160; At least, not for regular Distribution Lists.&#160; (It may be a bit complicated for Dynamic Distribution Lists, but hey - they are dynamic so there should be no reason to delegate management access to a Dynamic Distribution List)<\/p>\n<p>There may be good reasons to delegate this task to end users, and ideally these users should be able to use their Outlook client to manage the company Distribution Lists.&#160; Imagine that you can ask Marketing people to keep the Marketing distribution list up to date... or ask Sales support people to do the same for Sales DL's... and so on...&#160; Wouldn't that be great ?&#160;&#160;&#160; Luckily enough, it\u2019s not that complicated to make this happen.<\/p>\n<p>Whether you have installed Exchange 2007 into your \u2018account domain\u2019, or whether you are using a dedicated Exchange forest (and have at least a one way trust between the account domain and Exchange forest), the procedure will be exactly the same.<\/p>\n<p>In short, this is what needs to be done<\/p>\n<p>- in the account domain, create groups that contain the users that will be allowed to modify Distribution List membership.&#160; If you have multiple distribution lists and if you want to allow different people to manage these distribution lists, you may have to create multiple AD groups<\/p>\n<p>- in the domain that \u2018holds\u2019 Exchange, edit the security of the Distribution Lists and grant the newly created AD groups (from the account domain) access to the Distribution List<\/p>\n<h3>Set up permissions<\/h3>\n<p>First of all, you need to figure out who will be allowed to modify DL membership on a specific DL.&#160; Create management groups in your account domain and populate them with the user accounts that should be granted access.<\/p>\n<p>Let\u2019s say you have created a group call \u201cDL Membership Editors\u201d in your account domain and populated it with one or more users that are allowed to edit the DL membership.<\/p>\n<p><a href=\"\/wp-content\/uploads\/2009\/05\/image1.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" title=\"image\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" height=\"142\" alt=\"image\" src=\"\/wp-content\/uploads\/2009\/05\/image-thumb1.png\" width=\"245\" border=\"0\" \/><\/a><\/p>\n<p><a href=\"\/wp-content\/uploads\/2009\/05\/image2.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" title=\"image\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" height=\"77\" alt=\"image\" src=\"\/wp-content\/uploads\/2009\/05\/image-thumb2.png\" width=\"246\" border=\"0\" \/><\/a><\/p>\n<p>Open Active Directory Users &amp; Computers in the domain that \u2018holds\u2019 the Exchange environment. In an integrated solution, this is the account domain. When you are using a dedicated Exchange Resource Forest, you need to make the changes on the Resource Forest.<\/p>\n<p>Next, find the Active Directory object that refers to the Distribution List. In my example, I\u2019m using a Distribution List called \u201cMarketing\u201d, which contains no members so far.<\/p>\n<p>Edit the properties of the DL object, go to the security tabsheet and click the \u2019advanced\u2019 button.<\/p>\n<p>Click Add<\/p>\n<p>Enter the AD account domain group name that you want to delegate access to.&#160; (If you are configuring access in the Resource Forest, you\u2019ll have to use the \u201cLocations\u201d button first to select the account domain.<\/p>\n<p>In the next screen, choose \u201cproperties\u201d, set \u201cApply onto\u201d to \u201cGroup Objects\u201d and enable \u201cWrite Members\u201d<\/p>\n<p><a href=\"\/wp-content\/uploads\/2009\/05\/image3.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" title=\"image\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" height=\"216\" alt=\"image\" src=\"\/wp-content\/uploads\/2009\/05\/image-thumb3.png\" width=\"171\" border=\"0\" \/><\/a><\/p>\n<p>Click OK twice to save the changes. The group \u201cDL Membership Editors\u201d should now have \u201cSpecial Permissions\u201d set on the Distribution List object.<\/p>\n<p><a href=\"\/wp-content\/uploads\/2009\/05\/image4.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" title=\"image\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" height=\"210\" alt=\"image\" src=\"\/wp-content\/uploads\/2009\/05\/image-thumb4.png\" width=\"232\" border=\"0\" \/><\/a><\/p>\n<p>You can do the same with Powershell as well :<\/p>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">Add-ADPermission -Id &lt;name of distribution group&gt; -User &lt;name of user or group&gt; -AccessRights WriteProperty -Properties <span style=\"color: #006080\">&quot;Member&quot;<\/span><\/pre>\n<\/p><\/div>\n<p>In the \u201cname of user or group\u201d parameter, enter the name of the AD group in the account domain.&#160; So if you have a dedicated Exchange forest, the command should include the name of the domain :<\/p>\n<p><em>Add-ADPermission -id \u201cMarketing\u201d -User \u201cACCDOMAIN\\DL Membership Editors\u201d -AccessRights WriteProperty -Properties \u201cMember\u201d<\/em><\/p>\n<p><em>(Note that you need to use the Display name of the Group in the powershell command)<\/em><\/p>\n<p>&#160;<\/p>\n<h3>Test DL management<\/h3>\n<p>Now open Outlook on the computer of one of the users that is a member of the \u201cDL Membership Editors\u201d. I have noticed that, if Outlook was still running at the time the security was changed, the user will have to close Outlook &amp; relaunch Outlook before the changes are applied.<\/p>\n<p>Open the Global Address Book, find the group that needs to have its membership changed.<\/p>\n<p><a href=\"\/wp-content\/uploads\/2009\/05\/image5.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" title=\"image\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" height=\"138\" alt=\"image\" src=\"\/wp-content\/uploads\/2009\/05\/image-thumb5.png\" width=\"326\" border=\"0\" \/><\/a><\/p>\n<p>Edit the properties and click on \u201cModify Members\u201d<\/p>\n<p><a href=\"\/wp-content\/uploads\/2009\/05\/image6.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" title=\"image\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" height=\"136\" alt=\"image\" src=\"\/wp-content\/uploads\/2009\/05\/image-thumb6.png\" width=\"320\" border=\"0\" \/><\/a><\/p>\n<p>Add\/Remove members and click OK twice to save the changes.<\/p>\n<p><a href=\"\/wp-content\/uploads\/2009\/05\/image7.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" title=\"image\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" height=\"165\" alt=\"image\" src=\"\/wp-content\/uploads\/2009\/05\/image-thumb7.png\" width=\"323\" border=\"0\" \/><\/a><\/p>\n<p>That\u2019s all there\u2019s to it<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the challenges that result from operating a messaging environment is making sure the company\u2019s internal Distribution Lists stay up to date.&#160; In most corporate environments, this is a task that is typically assigned to IT staff, however it does not have to be like this.&#160; At least, not for regular Distribution Lists.&#160; (It &hellip; <a href=\"https:\/\/www.corelan.be\/index.php\/2009\/05\/21\/delegating-exchange-2007-distribution-list-management-to-end-users\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> \"Delegating Exchange 2007 Distribution List Management to End Users\"<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[349,909],"tags":[509,489],"class_list":["post-1905","post","type-post","status-publish","format-standard","hentry","category-exchange","category-outlook","tag-exchange","tag-outlook"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Delegating Exchange 2007 Distribution List Management to End Users - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2009\/05\/21\/delegating-exchange-2007-distribution-list-management-to-end-users\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Delegating Exchange 2007 Distribution List Management to End Users - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"One of the challenges that result from operating a messaging environment is making sure the company\u2019s internal Distribution Lists stay up to date.&#160; In most corporate environments, this is a task that is typically assigned to IT staff, however it does not have to be like this.&#160; At least, not for regular Distribution Lists.&#160; (It &hellip; Continue reading &quot;Delegating Exchange 2007 Distribution List Management to End Users&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2009\/05\/21\/delegating-exchange-2007-distribution-list-management-to-end-users\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2009-05-21T16:42:50+00:00\" \/>\n<meta name=\"author\" content=\"corelanc0d3r\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@corelanc0d3r\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/05\\\/21\\\/delegating-exchange-2007-distribution-list-management-to-end-users\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/05\\\/21\\\/delegating-exchange-2007-distribution-list-management-to-end-users\\\/\"},\"author\":{\"name\":\"corelanc0d3r\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\"},\"headline\":\"Delegating Exchange 2007 Distribution List Management to End Users\",\"datePublished\":\"2009-05-21T16:42:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/05\\\/21\\\/delegating-exchange-2007-distribution-list-management-to-end-users\\\/\"},\"wordCount\":704,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"keywords\":[\"MS Exchange\",\"Outlook\"],\"articleSection\":[\"MS Exchange\",\"Outlook\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/05\\\/21\\\/delegating-exchange-2007-distribution-list-management-to-end-users\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/05\\\/21\\\/delegating-exchange-2007-distribution-list-management-to-end-users\\\/\",\"name\":\"Delegating Exchange 2007 Distribution List Management to End Users - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"datePublished\":\"2009-05-21T16:42:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/05\\\/21\\\/delegating-exchange-2007-distribution-list-management-to-end-users\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/05\\\/21\\\/delegating-exchange-2007-distribution-list-management-to-end-users\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/05\\\/21\\\/delegating-exchange-2007-distribution-list-management-to-end-users\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Delegating Exchange 2007 Distribution List Management to End Users\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\",\"name\":\"corelanc0d3r\",\"pronouns\":\"he\\\/him\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"caption\":\"corelanc0d3r\"},\"description\":\"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.\",\"sameAs\":[\"https:\\\/\\\/www.corelan-training.com\",\"https:\\\/\\\/instagram.com\\\/corelanc0d3r\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/petervaneeckhoutte\\\/\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\"],\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/admin0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Delegating Exchange 2007 Distribution List Management to End Users - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2009\/05\/21\/delegating-exchange-2007-distribution-list-management-to-end-users\/","og_locale":"en_US","og_type":"article","og_title":"Delegating Exchange 2007 Distribution List Management to End Users - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"One of the challenges that result from operating a messaging environment is making sure the company\u2019s internal Distribution Lists stay up to date.&#160; In most corporate environments, this is a task that is typically assigned to IT staff, however it does not have to be like this.&#160; At least, not for regular Distribution Lists.&#160; (It &hellip; Continue reading \"Delegating Exchange 2007 Distribution List Management to End Users\"","og_url":"https:\/\/www.corelan.be\/index.php\/2009\/05\/21\/delegating-exchange-2007-distribution-list-management-to-end-users\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2009-05-21T16:42:50+00:00","author":"corelanc0d3r","twitter_card":"summary_large_image","twitter_creator":"@corelanc0d3r","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2009\/05\/21\/delegating-exchange-2007-distribution-list-management-to-end-users\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2009\/05\/21\/delegating-exchange-2007-distribution-list-management-to-end-users\/"},"author":{"name":"corelanc0d3r","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f"},"headline":"Delegating Exchange 2007 Distribution List Management to End Users","datePublished":"2009-05-21T16:42:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2009\/05\/21\/delegating-exchange-2007-distribution-list-management-to-end-users\/"},"wordCount":704,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"keywords":["MS Exchange","Outlook"],"articleSection":["MS Exchange","Outlook"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2009\/05\/21\/delegating-exchange-2007-distribution-list-management-to-end-users\/","url":"https:\/\/www.corelan.be\/index.php\/2009\/05\/21\/delegating-exchange-2007-distribution-list-management-to-end-users\/","name":"Delegating Exchange 2007 Distribution List Management to End Users - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"datePublished":"2009-05-21T16:42:50+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2009\/05\/21\/delegating-exchange-2007-distribution-list-management-to-end-users\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2009\/05\/21\/delegating-exchange-2007-distribution-list-management-to-end-users\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2009\/05\/21\/delegating-exchange-2007-distribution-list-management-to-end-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"Delegating Exchange 2007 Distribution List Management to End Users"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f","name":"corelanc0d3r","pronouns":"he\/him","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","caption":"corelanc0d3r"},"description":"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.","sameAs":["https:\/\/www.corelan-training.com","https:\/\/instagram.com\/corelanc0d3r","https:\/\/www.linkedin.com\/in\/petervaneeckhoutte\/","https:\/\/x.com\/corelanc0d3r"],"url":"https:\/\/www.corelan.be\/index.php\/author\/admin0\/"}]}},"views":27260,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/1905","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=1905"}],"version-history":[{"count":0,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/1905\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=1905"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=1905"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=1905"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}