SlideShare a Scribd company logo
1 of 51
Download to read offline
SecQuest                  INFORMATION SECURITY




44Con 2012: Toppling Domino

Testing security in a Lotus Notes environment


         Written & Presented by Darren Fuller

         SecQuest Information Security Ltd. 




                                           © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  About this Presentation

   This presentation was originally given at 44Con
   2012 in London and had a number of interactive
   demos which obviously cannot be included.
   If you or your company would like further information
   about Domino security or to arrange a re-run of this
   talk on your premises please contact us.
   https://www.secquest.co.uk
   Tel: 0845 19 31337



                                          © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Who Am I?

   Darren Fuller
    Lotus PCLP*
    Security Consultant
    Ex IBM Notes developer
    Ex IBM EMEA X-Force
    Run a company called SecQuest
    Been using Notes since V3 on IBM OS/2
                                                            * Domino R5


                                      © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  What I’m Talking About Today

   “Although there have been a number of technical
    papers published by different researchers covering
    Lotus Notes/Domino security it is rarely covered by
    the wider pen testing community.
     In this presentation I’ll aim to give a general
     overview of Domino security and demonstrate ways
     of breaking in. This will cover security issues from
     the point of view of the web server, native Domino
     server and demonstrate some tricks you can use
     from the client side of things.”

                                           © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Typical!

    Nothing about Notes/Domino for a while then
     William Dawson talked about it at BSides Vegas
     this year!
    Interesting talk about Domino hashes which we’ll
     cover in a bit of detail later
    Link to talks:
       http://www.irongeek.com/i.php?page=videos/bsideslasvegas2012/mainlist




                                                             © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Used By…

    More than half of Fortune 100 companies & more




                                       © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Lotus Notes/Domino: History

    Created by Ray Ozzie/Iris Associates
    V1 Shipped in 1989
    Included public key cryptography
    3 major editions available in the early days
    V8.5.4 is currently in beta




                                            © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Crypto Background Information

    US Edition used 64 bit keys
    International keys restricted to 40 bits due to US
     export rules before 1997
    Deal with US .gov to allow 64 bit international keys
     after 1997 providing they had the first 24 bits
    France didn’t like this! A French edition was made
     with 40 bit encryption keys
    These days 128 and 256 bit AES can be used


                                           © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Security Overview
    ID Files




    Database ACL (Access control list)
    Execution Control List (ECL)
    NAB Groups
                                          © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Security Overview – Encryption Layers

    Database Encryption
    Document Encryption
    Field Encryption
    Transport Layer Encryption




                                     © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  C’mon! We’re h4X0rs..

    Can we whack it?




                                © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Yes we Can!

    Examples given in this presentation are based on
     “real world” tests.
    These techniques have been used a number of
     times to compromise various client sites.
    Obviously root is nice but the data is the thing to
     go for, the right Notes user will give you the keys to
     the kingdom!




                                            © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Breaking In Externally – What to look for

    names.nsf database with anonymous access
    domlog.nsf with anonymous access
    webadmin.nsf (you’ll be lucky!)




                                        © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Checking out the /hacker Domain

    Anonymous access to domlog.nsf can give you a
     session ID, these default to 30 minute expiry




                                       © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  NAB Access!




                                © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Because..

    The admins have messed up and granted
     anonymous “reader” access




                                      © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  HTTPPassword in Document Source

    Vulnerability documented in 2005
    Still overlooked by a lot of admins




                                           © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  HTTPPassword in Document Source
   <input name="FullName" type="hidden" value="Milexa
     Crozzd/hacker; Milexa Crozzd">
   <input name="ShortName" type="hidden" value="milexa">
   <input name="HTTPPassword" type="hidden"
     value="(GbZjMLBTiHzBXtS0TcIl)">
   <input name="dspHTTPPassword" type="hidden"
     value="(GbZjMLBTiHzBXtS0TcIl)">


   Metasploit can automate hash gathering




                                                 © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Cracking Passwords

    Grab password hashes from the document source
    Domino has two types of password hashes for
     internet passwords; “normal” and “more secure”
    Use JTR with Jumbo Patch
                “normal” = “lotus5”
                “more secure” = “dominosec”




                                              © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Cracking Passwords: results




                                © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Targeting “Interesting” Users

    Once you have cracked some passwords you
     should be able to authenticate and access
     catalog.nsf
    If “internet authentication” is set to “Fewer name
     variations with higher security” you need to use the
     full canonical username: Joe King/hacker
    catalog.nsf contains a list of all databases on the
     server + access control information
    The “By Name” view will give you a list of
     databases your user can access
                                            © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Targeting “Interesting” Users




                                  © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Access Control List Info




                                © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Check group members in names.nsf




     JTR popped this one earlier!




                                     © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Getting More Access – Running Commands

    webadmin.nsf allows an administrator to run server
     commands.




                                         © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Getting More Access

    You can run O/S commands using “load” but can’t
     see the results when using quick console.
    For some reason writing output to a web
     accessible directory didn’t work on Linux




    Solution: upload a Notes database shell!

                                          © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Introducing shell.nsf aka D99Shell

    You may get a certificate error after uploading..




                                           © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  D99Shell in action!




                                © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Also works on Windows servers




                                  © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Demo: Breaking In!




                                Oh Noez! U R demoin dis live!?!

                                                            © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Breaking in from the Inside - Objectives

    Find ID files on the network
    Crack passwords
    Get in to the NAB on the server
    Find ID files with higher levels of access
    Pw0nage!




                                            © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Are Employees the Biggest Threat?




   “Many breaches of security are done by insiders“
               - Katherine Spanbauer, Domino senior product manager




                                                   © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Gaining A Toehold

    Since R5 you need an ID file to access the client
    ID file needs to be valid and not in a “deny access”
     group in the NAB.
    Shared directories FTW!




                                           © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Gaining A Toehold

    It used to be hard to crack native Notes passwords!
    There are a number of products available to crack
     ID file passwords


    Huge thanks to Nataly at Passware for the software
                                       *



     being used in the following demo..


       * http://www.lostpassword.com



                                           © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Demo: Notes ID Password Cracking




                                I can haz beerz after, right?

                                                                © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  We’re going after the payroll
    Our freshly cracked ID file gives catalog.nsf &
     names.nsf access




                                           © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Check the NAB (names.nsf) for group members




               Oops!

                                   © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  The result..




                                © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Client-side Tricks

    Spoofing mail..
    Removing restrictions of local access
    LotusScript can access the Windows API!

   Declare Function GetClipboardData Lib "User32" (Byval wFormat
     As Long) As Long




                                               © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Mail spoofing; getting a payrise!

    SMTP mail can be easily spoofed using telnet but
     document properties are a dead giveaway




                                         © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  The Spoof Memo Form

    This is all that is required:




                                     © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  The result

    Create a new mail using the evil form and
     copy/paste it in to the mail.box database on the
     spoofed user’s server


                                                            The only
                                                            giveaway..


    Looks Good..




                                          © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Local Access Protection

    Lotus Notes has an ACL setting to “Enforce
     consistent ACL”
    Opening a “protected” database locally gives an
     error like this:




       Not this ->

                                         © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  I Can’t Access It Locally Eh!

    There are companies out there selling various
     unlock solutions
    Prices for software range from $49 to $657!!


    I’ve tested a few versions of these “life saving”
     products..
    One of them changed 4 bytes, another changed 6!



                                            © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  I Can’t Access It Locally Eh!

   I mentioned to colleagues @ IBM in 2004 that you
    could change 1 byte to remove protection
   These apps are doing 75% too much work! 


   Sorry guys, the secret’s out:
   Changing 0x000002C4 from 20 to 00 could save $700!




                                        © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Tool release

    Local Access Protection Deprotector And No Cash
     Expected




                                       © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Tool release: lapdance

    Local Access Protection Deprotector And No Cash
     Expected (lapdance.pl)
    Written in Perl (badly), gives some info about the
     database and can add and remove protection




     Available from https://www.secquest.co.uk/tools/lapdance.pl

                                                © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Tool release: lapdance

    Local Access Protection Deprotector And No Cash
     Expected (lapdance.pl)
    Support for ODS versions 16, 17, 20, 41, 43, 48
     and 51 (ie. everything from V2 to V8.5)
    Will display database protection and encryption
     flags information
    Can add and remove local access protection




                                          © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  Demo: Removing Database Protection!




                       Ohalp! Prayrz 2 Ceilin Cat dat dis workz!

                                                         © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012



  To Finish..

   “In this presentation I’ll aim to give a general
    overview of Domino security and demonstrate ways
    of breaking in. This will cover security issues from
    the point of view of the web server, native Domino
    server and demonstrate some tricks you can use
    from the client side of things.”




                                          © 2012 SecQuest Information Security Ltd.
44Con: London, September 2012




                                     @UKFully
                                     @SecQuest

                                © 2012 SecQuest Information Security Ltd.

More Related Content

Similar to Toppling Domino - 44CON 4012

Security Patterns for Microservice Architectures - London Java Community 2020
Security Patterns for Microservice Architectures - London Java Community 2020Security Patterns for Microservice Architectures - London Java Community 2020
Security Patterns for Microservice Architectures - London Java Community 2020Matt Raible
 
Security Patterns for Microservice Architectures - Oktane20
Security Patterns for Microservice Architectures - Oktane20Security Patterns for Microservice Architectures - Oktane20
Security Patterns for Microservice Architectures - Oktane20Matt Raible
 
Linked Open Data (LOD) Cloud & Ontology Life Cycles
Linked Open Data (LOD) Cloud & Ontology Life Cycles Linked Open Data (LOD) Cloud & Ontology Life Cycles
Linked Open Data (LOD) Cloud & Ontology Life Cycles Kingsley Uyi Idehen
 
JSCONF 2018 - Baking security into DevOps - a tale of hunting down bugs befor...
JSCONF 2018 - Baking security into DevOps - a tale of hunting down bugs befor...JSCONF 2018 - Baking security into DevOps - a tale of hunting down bugs befor...
JSCONF 2018 - Baking security into DevOps - a tale of hunting down bugs befor...Wouter Bloeyaert
 
Security Patterns for Microservice Architectures - ADTMag Microservices & API...
Security Patterns for Microservice Architectures - ADTMag Microservices & API...Security Patterns for Microservice Architectures - ADTMag Microservices & API...
Security Patterns for Microservice Architectures - ADTMag Microservices & API...Matt Raible
 
PioneersIO - Networking with Docker
PioneersIO - Networking with DockerPioneersIO - Networking with Docker
PioneersIO - Networking with DockerLaurent Grangeau
 
Managing Compliance in Container Environments
Managing Compliance in Container EnvironmentsManaging Compliance in Container Environments
Managing Compliance in Container EnvironmentsTwistlock
 
Chris Swan at QCon 2014: Using Docker in Cloud Networks
Chris Swan at QCon 2014: Using Docker in Cloud NetworksChris Swan at QCon 2014: Using Docker in Cloud Networks
Chris Swan at QCon 2014: Using Docker in Cloud NetworksCohesive Networks
 
Internet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond ReedInternet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond ReedSSIMeetup
 
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
OAuth 101 & Secure APIs 2012 Cloud Identity SummitOAuth 101 & Secure APIs 2012 Cloud Identity Summit
OAuth 101 & Secure APIs 2012 Cloud Identity SummitBrian Campbell
 
Connectors for the New Enterprise with WSO2 ESB 4.8
Connectors for the New Enterprise with WSO2 ESB 4.8Connectors for the New Enterprise with WSO2 ESB 4.8
Connectors for the New Enterprise with WSO2 ESB 4.8WSO2
 
Securing User Data with SQLCipher
Securing User Data with SQLCipherSecuring User Data with SQLCipher
Securing User Data with SQLCipherCommonsWare
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021lior mazor
 
Better Do What They Told Ya
Better Do What They Told YaBetter Do What They Told Ya
Better Do What They Told Yaurma
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at EdgeDell EMC World
 
Emerging Threats and Attack Surfaces
Emerging Threats and Attack SurfacesEmerging Threats and Attack Surfaces
Emerging Threats and Attack SurfacesPeter Wood
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliveryTim Mackey
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliveryBlack Duck by Synopsys
 

Similar to Toppling Domino - 44CON 4012 (20)

Security Patterns for Microservice Architectures - London Java Community 2020
Security Patterns for Microservice Architectures - London Java Community 2020Security Patterns for Microservice Architectures - London Java Community 2020
Security Patterns for Microservice Architectures - London Java Community 2020
 
Security Patterns for Microservice Architectures - Oktane20
Security Patterns for Microservice Architectures - Oktane20Security Patterns for Microservice Architectures - Oktane20
Security Patterns for Microservice Architectures - Oktane20
 
Linked Open Data (LOD) Cloud & Ontology Life Cycles
Linked Open Data (LOD) Cloud & Ontology Life Cycles Linked Open Data (LOD) Cloud & Ontology Life Cycles
Linked Open Data (LOD) Cloud & Ontology Life Cycles
 
Understanding AWS security
Understanding AWS securityUnderstanding AWS security
Understanding AWS security
 
JSCONF 2018 - Baking security into DevOps - a tale of hunting down bugs befor...
JSCONF 2018 - Baking security into DevOps - a tale of hunting down bugs befor...JSCONF 2018 - Baking security into DevOps - a tale of hunting down bugs befor...
JSCONF 2018 - Baking security into DevOps - a tale of hunting down bugs befor...
 
Security Patterns for Microservice Architectures - ADTMag Microservices & API...
Security Patterns for Microservice Architectures - ADTMag Microservices & API...Security Patterns for Microservice Architectures - ADTMag Microservices & API...
Security Patterns for Microservice Architectures - ADTMag Microservices & API...
 
PioneersIO - Networking with Docker
PioneersIO - Networking with DockerPioneersIO - Networking with Docker
PioneersIO - Networking with Docker
 
Managing Compliance in Container Environments
Managing Compliance in Container EnvironmentsManaging Compliance in Container Environments
Managing Compliance in Container Environments
 
Chris Swan at QCon 2014: Using Docker in Cloud Networks
Chris Swan at QCon 2014: Using Docker in Cloud NetworksChris Swan at QCon 2014: Using Docker in Cloud Networks
Chris Swan at QCon 2014: Using Docker in Cloud Networks
 
Internet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond ReedInternet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond Reed
 
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
OAuth 101 & Secure APIs 2012 Cloud Identity SummitOAuth 101 & Secure APIs 2012 Cloud Identity Summit
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
 
Connectors for the New Enterprise with WSO2 ESB 4.8
Connectors for the New Enterprise with WSO2 ESB 4.8Connectors for the New Enterprise with WSO2 ESB 4.8
Connectors for the New Enterprise with WSO2 ESB 4.8
 
Securing User Data with SQLCipher
Securing User Data with SQLCipherSecuring User Data with SQLCipher
Securing User Data with SQLCipher
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021
 
Better Do What They Told Ya
Better Do What They Told YaBetter Do What They Told Ya
Better Do What They Told Ya
 
Better Do What They Told Ya
Better Do What They Told YaBetter Do What They Told Ya
Better Do What They Told Ya
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at Edge
 
Emerging Threats and Attack Surfaces
Emerging Threats and Attack SurfacesEmerging Threats and Attack Surfaces
Emerging Threats and Attack Surfaces
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous Delivery
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous Delivery
 

More from 44CON

They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...44CON
 
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...44CON
 
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...44CON
 
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...44CON
 
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...44CON
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...44CON
 
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...44CON
 
Pwning the 44CON Nerf Tank
Pwning the 44CON Nerf TankPwning the 44CON Nerf Tank
Pwning the 44CON Nerf Tank44CON
 
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...44CON
 
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images44CON
 
44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?44CON
 
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...44CON
 
44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy44CON
 
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis44CON
 
44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security44CON
 
44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection44CON
 
44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities44CON
 
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...44CON
 
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root44CON
 
44CON London 2015 - reverse reverse engineering
44CON London 2015 - reverse reverse engineering44CON London 2015 - reverse reverse engineering
44CON London 2015 - reverse reverse engineering44CON
 

More from 44CON (20)

They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
 
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
 
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
 
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
 
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
 
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
 
Pwning the 44CON Nerf Tank
Pwning the 44CON Nerf TankPwning the 44CON Nerf Tank
Pwning the 44CON Nerf Tank
 
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
 
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
 
44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?
 
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
 
44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy
 
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
 
44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security
 
44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection
 
44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities
 
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
 
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
 
44CON London 2015 - reverse reverse engineering
44CON London 2015 - reverse reverse engineering44CON London 2015 - reverse reverse engineering
44CON London 2015 - reverse reverse engineering
 

Recently uploaded

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Toppling Domino - 44CON 4012

  • 1. SecQuest INFORMATION SECURITY 44Con 2012: Toppling Domino Testing security in a Lotus Notes environment Written & Presented by Darren Fuller SecQuest Information Security Ltd.  © 2012 SecQuest Information Security Ltd.
  • 2. 44Con: London, September 2012 About this Presentation This presentation was originally given at 44Con 2012 in London and had a number of interactive demos which obviously cannot be included. If you or your company would like further information about Domino security or to arrange a re-run of this talk on your premises please contact us. https://www.secquest.co.uk Tel: 0845 19 31337 © 2012 SecQuest Information Security Ltd.
  • 3. 44Con: London, September 2012 Who Am I? Darren Fuller  Lotus PCLP*  Security Consultant  Ex IBM Notes developer  Ex IBM EMEA X-Force  Run a company called SecQuest  Been using Notes since V3 on IBM OS/2 * Domino R5 © 2012 SecQuest Information Security Ltd.
  • 4. 44Con: London, September 2012 What I’m Talking About Today “Although there have been a number of technical papers published by different researchers covering Lotus Notes/Domino security it is rarely covered by the wider pen testing community. In this presentation I’ll aim to give a general overview of Domino security and demonstrate ways of breaking in. This will cover security issues from the point of view of the web server, native Domino server and demonstrate some tricks you can use from the client side of things.” © 2012 SecQuest Information Security Ltd.
  • 5. 44Con: London, September 2012 Typical!  Nothing about Notes/Domino for a while then William Dawson talked about it at BSides Vegas this year!  Interesting talk about Domino hashes which we’ll cover in a bit of detail later  Link to talks: http://www.irongeek.com/i.php?page=videos/bsideslasvegas2012/mainlist © 2012 SecQuest Information Security Ltd.
  • 6. 44Con: London, September 2012 Used By…  More than half of Fortune 100 companies & more © 2012 SecQuest Information Security Ltd.
  • 7. 44Con: London, September 2012 Lotus Notes/Domino: History  Created by Ray Ozzie/Iris Associates  V1 Shipped in 1989  Included public key cryptography  3 major editions available in the early days  V8.5.4 is currently in beta © 2012 SecQuest Information Security Ltd.
  • 8. 44Con: London, September 2012 Crypto Background Information  US Edition used 64 bit keys  International keys restricted to 40 bits due to US export rules before 1997  Deal with US .gov to allow 64 bit international keys after 1997 providing they had the first 24 bits  France didn’t like this! A French edition was made with 40 bit encryption keys  These days 128 and 256 bit AES can be used © 2012 SecQuest Information Security Ltd.
  • 9. 44Con: London, September 2012 Security Overview  ID Files  Database ACL (Access control list)  Execution Control List (ECL)  NAB Groups © 2012 SecQuest Information Security Ltd.
  • 10. 44Con: London, September 2012 Security Overview – Encryption Layers  Database Encryption  Document Encryption  Field Encryption  Transport Layer Encryption © 2012 SecQuest Information Security Ltd.
  • 11. 44Con: London, September 2012 C’mon! We’re h4X0rs..  Can we whack it? © 2012 SecQuest Information Security Ltd.
  • 12. 44Con: London, September 2012 Yes we Can!  Examples given in this presentation are based on “real world” tests.  These techniques have been used a number of times to compromise various client sites.  Obviously root is nice but the data is the thing to go for, the right Notes user will give you the keys to the kingdom! © 2012 SecQuest Information Security Ltd.
  • 13. 44Con: London, September 2012 Breaking In Externally – What to look for  names.nsf database with anonymous access  domlog.nsf with anonymous access  webadmin.nsf (you’ll be lucky!) © 2012 SecQuest Information Security Ltd.
  • 14. 44Con: London, September 2012 Checking out the /hacker Domain  Anonymous access to domlog.nsf can give you a session ID, these default to 30 minute expiry © 2012 SecQuest Information Security Ltd.
  • 15. 44Con: London, September 2012 NAB Access! © 2012 SecQuest Information Security Ltd.
  • 16. 44Con: London, September 2012 Because..  The admins have messed up and granted anonymous “reader” access © 2012 SecQuest Information Security Ltd.
  • 17. 44Con: London, September 2012 HTTPPassword in Document Source  Vulnerability documented in 2005  Still overlooked by a lot of admins © 2012 SecQuest Information Security Ltd.
  • 18. 44Con: London, September 2012 HTTPPassword in Document Source <input name="FullName" type="hidden" value="Milexa Crozzd/hacker; Milexa Crozzd"> <input name="ShortName" type="hidden" value="milexa"> <input name="HTTPPassword" type="hidden" value="(GbZjMLBTiHzBXtS0TcIl)"> <input name="dspHTTPPassword" type="hidden" value="(GbZjMLBTiHzBXtS0TcIl)"> Metasploit can automate hash gathering © 2012 SecQuest Information Security Ltd.
  • 19. 44Con: London, September 2012 Cracking Passwords  Grab password hashes from the document source  Domino has two types of password hashes for internet passwords; “normal” and “more secure”  Use JTR with Jumbo Patch “normal” = “lotus5” “more secure” = “dominosec” © 2012 SecQuest Information Security Ltd.
  • 20. 44Con: London, September 2012 Cracking Passwords: results © 2012 SecQuest Information Security Ltd.
  • 21. 44Con: London, September 2012 Targeting “Interesting” Users  Once you have cracked some passwords you should be able to authenticate and access catalog.nsf  If “internet authentication” is set to “Fewer name variations with higher security” you need to use the full canonical username: Joe King/hacker  catalog.nsf contains a list of all databases on the server + access control information  The “By Name” view will give you a list of databases your user can access © 2012 SecQuest Information Security Ltd.
  • 22. 44Con: London, September 2012 Targeting “Interesting” Users © 2012 SecQuest Information Security Ltd.
  • 23. 44Con: London, September 2012 Access Control List Info © 2012 SecQuest Information Security Ltd.
  • 24. 44Con: London, September 2012 Check group members in names.nsf JTR popped this one earlier! © 2012 SecQuest Information Security Ltd.
  • 25. 44Con: London, September 2012 Getting More Access – Running Commands  webadmin.nsf allows an administrator to run server commands. © 2012 SecQuest Information Security Ltd.
  • 26. 44Con: London, September 2012 Getting More Access  You can run O/S commands using “load” but can’t see the results when using quick console.  For some reason writing output to a web accessible directory didn’t work on Linux  Solution: upload a Notes database shell! © 2012 SecQuest Information Security Ltd.
  • 27. 44Con: London, September 2012 Introducing shell.nsf aka D99Shell  You may get a certificate error after uploading.. © 2012 SecQuest Information Security Ltd.
  • 28. 44Con: London, September 2012 D99Shell in action! © 2012 SecQuest Information Security Ltd.
  • 29. 44Con: London, September 2012 Also works on Windows servers © 2012 SecQuest Information Security Ltd.
  • 30. 44Con: London, September 2012 Demo: Breaking In! Oh Noez! U R demoin dis live!?! © 2012 SecQuest Information Security Ltd.
  • 31. 44Con: London, September 2012 Breaking in from the Inside - Objectives  Find ID files on the network  Crack passwords  Get in to the NAB on the server  Find ID files with higher levels of access  Pw0nage! © 2012 SecQuest Information Security Ltd.
  • 32. 44Con: London, September 2012 Are Employees the Biggest Threat? “Many breaches of security are done by insiders“ - Katherine Spanbauer, Domino senior product manager © 2012 SecQuest Information Security Ltd.
  • 33. 44Con: London, September 2012 Gaining A Toehold  Since R5 you need an ID file to access the client  ID file needs to be valid and not in a “deny access” group in the NAB.  Shared directories FTW! © 2012 SecQuest Information Security Ltd.
  • 34. 44Con: London, September 2012 Gaining A Toehold  It used to be hard to crack native Notes passwords!  There are a number of products available to crack ID file passwords  Huge thanks to Nataly at Passware for the software * being used in the following demo.. * http://www.lostpassword.com © 2012 SecQuest Information Security Ltd.
  • 35. 44Con: London, September 2012 Demo: Notes ID Password Cracking I can haz beerz after, right? © 2012 SecQuest Information Security Ltd.
  • 36. 44Con: London, September 2012 We’re going after the payroll  Our freshly cracked ID file gives catalog.nsf & names.nsf access © 2012 SecQuest Information Security Ltd.
  • 37. 44Con: London, September 2012 Check the NAB (names.nsf) for group members Oops! © 2012 SecQuest Information Security Ltd.
  • 38. 44Con: London, September 2012 The result.. © 2012 SecQuest Information Security Ltd.
  • 39. 44Con: London, September 2012 Client-side Tricks  Spoofing mail..  Removing restrictions of local access  LotusScript can access the Windows API! Declare Function GetClipboardData Lib "User32" (Byval wFormat As Long) As Long © 2012 SecQuest Information Security Ltd.
  • 40. 44Con: London, September 2012 Mail spoofing; getting a payrise!  SMTP mail can be easily spoofed using telnet but document properties are a dead giveaway © 2012 SecQuest Information Security Ltd.
  • 41. 44Con: London, September 2012 The Spoof Memo Form  This is all that is required: © 2012 SecQuest Information Security Ltd.
  • 42. 44Con: London, September 2012 The result  Create a new mail using the evil form and copy/paste it in to the mail.box database on the spoofed user’s server The only giveaway.. Looks Good.. © 2012 SecQuest Information Security Ltd.
  • 43. 44Con: London, September 2012 Local Access Protection  Lotus Notes has an ACL setting to “Enforce consistent ACL”  Opening a “protected” database locally gives an error like this: Not this -> © 2012 SecQuest Information Security Ltd.
  • 44. 44Con: London, September 2012 I Can’t Access It Locally Eh!  There are companies out there selling various unlock solutions  Prices for software range from $49 to $657!!  I’ve tested a few versions of these “life saving” products..  One of them changed 4 bytes, another changed 6! © 2012 SecQuest Information Security Ltd.
  • 45. 44Con: London, September 2012 I Can’t Access It Locally Eh!  I mentioned to colleagues @ IBM in 2004 that you could change 1 byte to remove protection  These apps are doing 75% too much work!   Sorry guys, the secret’s out: Changing 0x000002C4 from 20 to 00 could save $700! © 2012 SecQuest Information Security Ltd.
  • 46. 44Con: London, September 2012 Tool release  Local Access Protection Deprotector And No Cash Expected © 2012 SecQuest Information Security Ltd.
  • 47. 44Con: London, September 2012 Tool release: lapdance  Local Access Protection Deprotector And No Cash Expected (lapdance.pl)  Written in Perl (badly), gives some info about the database and can add and remove protection Available from https://www.secquest.co.uk/tools/lapdance.pl © 2012 SecQuest Information Security Ltd.
  • 48. 44Con: London, September 2012 Tool release: lapdance  Local Access Protection Deprotector And No Cash Expected (lapdance.pl)  Support for ODS versions 16, 17, 20, 41, 43, 48 and 51 (ie. everything from V2 to V8.5)  Will display database protection and encryption flags information  Can add and remove local access protection © 2012 SecQuest Information Security Ltd.
  • 49. 44Con: London, September 2012 Demo: Removing Database Protection! Ohalp! Prayrz 2 Ceilin Cat dat dis workz! © 2012 SecQuest Information Security Ltd.
  • 50. 44Con: London, September 2012 To Finish.. “In this presentation I’ll aim to give a general overview of Domino security and demonstrate ways of breaking in. This will cover security issues from the point of view of the web server, native Domino server and demonstrate some tricks you can use from the client side of things.” © 2012 SecQuest Information Security Ltd.
  • 51. 44Con: London, September 2012 @UKFully @SecQuest © 2012 SecQuest Information Security Ltd.