Penetration Testing mailing list archives
RE: Pen-testing/auditing MS Exchange Servers.
From: "Justin Polazzo" <JPolazzo () allarus com>
Date: Fri, 25 Aug 2006 15:30:59 -0400
One thing to check for is that the proper encryption and authentication methods are in place. For example: NTLM hashes are easy to break, and there is a flaw with the RPC over HTTP proxy feature that makes it so you have to use either Basic (plain text) or NTLM (not NTLMv2) authentication. If they did not set up the proxy to use HTTPS you can sniff the hashes and use rainbow tables to extract a password. Check to make sure they have the right authentication methods for their OWA site as well (not plain text, ssl is enabled). One weird thing about the OWA site is that you can guess passwords forever, without locking out the associated account. I havent tried to brute force a password via OWA, but if you can find a way to automate..., well that would be an issue with MS and not with your client I guess. :-) The above wont break a thing, the below might: Also, try the metasploit framework's exploits for exchange server, this will verify their patch status at least. hth -JP ------------------------------------------------------------------------ This List Sponsored by: Cenzic Need to secure your web apps? Cenzic Hailstorm finds vulnerabilities fast. Click the link to buy it, try it or download Hailstorm for FREE. http://www.cenzic.com/products_services/download_hailstorm.php ------------------------------------------------------------------------
Current thread:
- RE: Penetration Testing - Human Factor, (continued)
- RE: Penetration Testing - Human Factor Isaac Van Name (Aug 24)
- RE: Penetration Testing - Human Factor StyleWar (Aug 26)
- Re: Penetration Testing - Human Factor R. DuFresne (Aug 22)
- RE: Penetration Testing - Human Factor StyleWar (Aug 26)
- Re: Penetration Testing - Human Factor Catsworth (Aug 22)
- RE: Penetration Testing - Human Factor KeenerPB (Aug 22)
- Re: Penetration Testing - Human Factor Joey Peloquin (Aug 23)
- Message not available
- Re: Penetration Testing - Human Factor K K Mookhey (Aug 23)
- RE: Penetration Testing - Human Factor Robert D. Holtz - Lists (Aug 23)
- Re: Penetration Testing - Human Factor Joey Peloquin (Aug 23)
- Pen-testing/auditing MS Exchange Servers. Serge Vondandamo (Aug 24)
- RE: Pen-testing/auditing MS Exchange Servers. Justin Polazzo (Aug 25)
- RE: Penetration Testing - Human Factor StyleWar (Aug 26)
- Re: Penetration Testing - Human Factor Joey Peloquin (Aug 29)