Security Basics mailing list archives

RE: Sniffing Mail Traffic - Outlook --> Exchange Server


From: Craig Wright <Craig.Wright () bdo com au>
Date: Sat, 8 Mar 2008 07:34:20 +1100


Hi,
Microsoft has released details on most of their proprietary protocols.They are not hidden any longer.

The Microsoft Communications Protocol Program (MCPP) technical documentation set provides detailed technical 
specifications for Microsoft proprietary protocols (including extensions to industry-standard or other published 
protocols) that are implemented and used in Windows client operating systems (namely Windows 2000 Professional and 
successors up to and including Windows Vista) to interoperate or communicate natively with Windows Server operating 
systems (namely Windows NT 3.1 up to and including Windows Server 2008). The documentation set includes a set of 
companion overview and reference documents that supplement the technical specifications with conceptual background, 
overviews of inter-protocol relationships and interactions, and technical reference information, such as common data 
types and error codes.

http://msdn2.microsoft.com/en-us/library/cc216513.aspx

MAPI is included as are most of the RPC's

Regards,
Craig Wright (GSE-Compliance)

Craig Wright
Manager of Information Systems

Direct : +61 2 9286 5497
Craig.Wright () bdo com au
+61 417 683 914

BDO Kendalls (NSW)
Level 19, 2 Market Street Sydney NSW 2000
GPO BOX 2551 Sydney NSW 2001
Fax +61 2 9993 9497
http://www.bdo.com.au/

Liability limited by a scheme approved under Professional Standards Legislation in respect of matters arising within 
those States and Territories of Australia where such legislation exists.

The information in this email and any attachments is confidential. If you are not the named addressee you must not 
read, print, copy, distribute, or use in any way this transmission or any information it contains. If you have received 
this message in error, please notify the sender by return email, destroy all copies and delete it from your system.

Any views expressed in this message are those of the individual sender and not necessarily endorsed by BDO Kendalls. 
You may not rely on this message as advice unless subsequently confirmed by fax or letter signed by a Partner or 
Director of BDO Kendalls. It is your responsibility to scan this communication and any files attached for computer 
viruses and other defects. BDO Kendalls does not accept liability for any loss or damage however caused which may 
result from this communication or any files attached. A full version of the BDO Kendalls disclaimer, and our Privacy 
statement, can be found on the BDO Kendalls website at http://www.bdo.com.au/ or by emailing mailto:administrator () 
bdo com au.

BDO Kendalls is a national association of separate partnerships and entities.

________________________________________

From: listbounce () securityfocus com [listbounce () securityfocus com] On Behalf Of jy [u8906250 () gmail com]
Sent: Friday, 7 March 2008 5:55 PM
To: security-basics () securityfocus com
Subject: Re: Sniffing Mail Traffic - Outlook --> Exchange Server

Kurt Buff wrote:

You are missing something.

Normally, traffic between Outlook and an Exchange server is in MAPI,
not IMAP, and is not in clear text.

Doesn't mean it isn't decodable - it may very well be - but it does
mean that it's not in clear text.

Kurt



hi, Kurt

May I ask you how to decode MAPI?
Or any document about decode MAPI?

thanks

--
View this message in context: 
http://www.nabble.com/Sniffing-Mail-Traffic---Outlook---%3E-Exchange-Server-tp14737968p15890899.html
Sent from the Security Basics mailing list archive at Nabble.com.



Current thread: