Penetration Testing mailing list archives

Re: wanted: a script to try dictionary attacks against NOTES ID files


From: jjore () imation com
Date: Tue, 20 Nov 2001 08:53:22 -0600

Not really. While hope is not completely lost it will take some coding on 
your part. I'm working on Notes <-> perl integration and there is some 
work another person did that is relevant to your question. The thing is, 
you must write some C code that does an extension manager call back (this 
is using the Domino C API) and passes in your own custom password. It's at 
this point that you could turn that into a function and script it.

Check out 
http://www.greentechnologist.org/domino/perl/Notes-0.24a/ln_password.c for 
more ideas.

Josh




nobody <pentester () yahoo com>
11/19/01 02:56 PM

 
        To:     pentest_list <pen-test () securityfocus com>
        cc: 
        Subject:        wanted: a script to try dictionary attacks against NOTES ID files


All,

anyone have a perl script -or - other - that will read
a large dictionary file & try to find the password
used for NOTES  userid.id files  ??

I am hoping that there is a command line options like:

notes -p password  userid.id

or some construct that will allow a large dictionary
to be tested with multiple NOTES id files.

thanks

__________________________________________________
Do You Yahoo!?
Find the one for you at Yahoo! Personals
http://personals.yahoo.com

----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert 
(SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please 
see:
https://alerts.securityfocus.com/





----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/


Current thread: