Written & Presented by Darren Fuller SecQuest Information Security Ltd.



Similar documents
Penetration: from Application down to OS

Lotus Domino Security

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Linux VPS with cpanel. Getting Started Guide

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

IS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

Three Ways to Secure Virtual Applications

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

The Top Web Application Attacks: Are you vulnerable?

Plunder Pillage & Print

GlobalSign Enterprise Solutions

to Alfresco Folder

IT HEALTHCHECK TOP TIPS WHITEPAPER

Egress Switch Reader. User Guide 2.3

WHMCS LUXCLOUD MODULE

BlackBerry Business Cloud Services. Administration Guide

Hack Your SQL Server Database Before the Hackers Do

NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices

Still Aren't Doing. Frank Kim

Five Steps to Improve Internal Network Security. Chattanooga Information security Professionals

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

Outlook 2010 Setup Guide (POP3)

Xerox DocuShare Security Features. Security White Paper

Centrify Cloud Connector Deployment Guide

Open Mic on IBM Notes Traveler Best Practices. Date: 11 July, 2013

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

VERALAB LDAP Configuration Guide

Cloudwork Dashboard User Manual

MS Enterprise Library 5.0 (Logging Application Block)

How to Setup your Account -Apple Mail for Mac OS X 1- Open Mail

Livezilla How to Install on Shared Hosting By: Jon Manning

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my ? Q. How do I change or reset a password for an account?

Installing Certificates on Spectralink 8400 Handsets

Pentesting for fun... and profit! David M. N. Bryan and Rob Havelt

STABLE & SECURE BANK lab writeup. Page 1 of 21

How to configure the TopCloudXL WHMCS plugin (version 2+) Update: Version: 2.2

DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO

Terms you ll need to understand:

Administration Guide. . All right reserved. For more information about Specops Password Sync and other Specops products, visit

RoomWizard Synchronization Software Manual Installation Instructions

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Gateway

EVERYTHING LDAP. Gabriella Davis

How to configure your client

Acano solution. Security Considerations. August E

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Passcape Software. DPAPI flaw. Vulnerability of DPAPI data protection in Win2K, Win2K3, Windows Server 2008, and Windows Server 2012

Quick Start Policy Patrol Disclaimers 10

Anatomy of an ethical penetration test

How To Send Mail From A Macbook Access To A Pc Or Ipad With A Password Protected Address (Monroe Access) On A Pc (For Macbook) Or Ipa (For Ipa) On Pc Or Macbook (For

CMT for Notes. Installation Guide

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Instructions: Configuring Outlook 2003 with Exchange 2010 on the FIUMail

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry

Web Engineering Web Application Security Issues

Penetration Testing Walkthrough

With Great Power comes Great Responsibility: Managing Privileged Users

Exploiting Transparent User Identification Systems

AD Self Password Reset Installation and configuration

Hackproofing Lotus Domino Web Server

User Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration

User Guide for the VersaMail Application

Articles Fighting SPAM in Lotus Domino

Why Should You Care About Security Issues? SySmox WEB security Top seven ColdFusion Security Issues

Cryoserver Archive Lotus Notes Configuration

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

How Reflection Software Facilitates PCI DSS Compliance

The Security of MDM systems. Hack In Paris 2013 Sebastien Andrivet

Computer Security: Principles and Practice

Configuring MailArchiva with Insight Server

Network Security - ISA 656 Security

mkryptor allows you to easily send secure s. This document will give you a technical overview of how. mkryptor is a software product from

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

IceWarp to IceWarp Server Migration

IBM Lotus Protector for Mail Encryption. User's Guide

Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management

SSL for VM: The Hard Way and the Easy Way

Nevepoint Access Manager 1.2 BETA Documentation

Upgrading, Integrating, and Troubleshooting Exchange Server 2003 in Mixed Environments

Analyzing the Security Schemes of Various Cloud Storage Services

Lepide Active Directory Self Service. Configuration Guide. Follow the simple steps given in this document to start working with

Populating Your Domino Directory (Or ANY Domino Database) With Tivoli Directory Integrator. Marie Scott Thomas Duffbert Duff

Web Application Security

Cloud Server powered by Mac OS X. Getting Started Guide. Cloud Server. powered by Mac OS X. AKJZNAzsqknsxxkjnsjx Getting Started Guide Page 1

How to Pop to Outlook

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown

SecureVault Online Backup Service FAQ

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Update Instructions

DIRECTORY PASSWORD V1.2 Quick Start Guide

QTEL MOBILE CORPORATE EDITION

Transcription:

SecQuest INFORMATION SECURITY 44Con 2012: Toppling Domino Testing security in a Lotus Notes environment Written & Presented by Darren Fuller SecQuest Information Security Ltd.

About this Presentation This presentation was originally given at 44Con 2012 in London and had a number of interactive demos which obviously cannot be included. If you or your company would like further information about Domino security or to arrange a re-run of this talk on your premises please contact us. https://www.secquest.co.uk Tel: 0845 19 31337

Who Am I? Darren Fuller Lotus PCLP * Security Consultant Ex IBM Notes developer Ex IBM EMEA X-Force Run a company called SecQuest Been using Notes since V3 on IBM OS/2 * Domino R5

What I m Talking About Today Although there have been a number of technical papers published by different researchers covering Lotus Notes/Domino security it is rarely covered by the wider pen testing community. In this presentation I ll aim to give a general overview of Domino security and demonstrate ways of breaking in. This will cover security issues from the point of view of the web server, native Domino server and demonstrate some tricks you can use from the client side of things.

Typical! Nothing about Notes/Domino for a while then William Dawson talked about it at BSides Vegas this year! Interesting talk about Domino hashes which we ll cover in a bit of detail later Link to talks: http://www.irongeek.com/i.php?page=videos/bsideslasvegas2012/mainlist

Used By More than half of Fortune 100 companies & more

Lotus Notes/Domino: History Created by Ray Ozzie/Iris Associates V1 Shipped in 1989 Included public key cryptography 3 major editions available in the early days V8.5.4 is currently in beta

Crypto Background Information US Edition used 64 bit keys International keys restricted to 40 bits due to US export rules before 1997 Deal with US.gov to allow 64 bit international keys after 1997 providing they had the first 24 bits France didn t like this! A French edition was made with 40 bit encryption keys These days 128 and 256 bit AES can be used

Security Overview ID Files Database ACL (Access control list) Execution Control List (ECL) NAB Groups

Security Overview Encryption Layers Database Encryption Document Encryption Field Encryption Transport Layer Encryption

C mon! We re h4x0rs.. Can we whack it?

Yes we Can! Examples given in this presentation are based on real world tests. These techniques have been used a number of times to compromise various client sites. Obviously root is nice but the data is the thing to go for, the right Notes user will give you the keys to the kingdom!

Breaking In Externally What to look for names.nsf database with anonymous access domlog.nsf with anonymous access webadmin.nsf (you ll be lucky!)

Checking out the /hacker Domain Anonymous access to domlog.nsf can give you a session ID, these default to 30 minute expiry

NAB Access!

Because.. The admins have messed up and granted anonymous reader access

HTTPPassword in Document Source Vulnerability documented in 2005 Still overlooked by a lot of admins

HTTPPassword in Document Source <input name="fullname" type="hidden" value="milexa Crozzd/hacker; Milexa Crozzd"> <input name="shortname" type="hidden" value="milexa"> <input name="httppassword" type="hidden" value="(gbzjmlbtihzbxts0tcil)"> <input name="dsphttppassword" type="hidden" value="(gbzjmlbtihzbxts0tcil)"> Metasploit can automate hash gathering

Cracking Passwords Grab password hashes from the document source Domino has two types of password hashes for internet passwords; normal and more secure Use JTR with Jumbo Patch normal = lotus5 more secure = dominosec

Cracking Passwords: results

Targeting Interesting Users Once you have cracked some passwords you should be able to authenticate and access catalog.nsf If internet authentication is set to Fewer name variations with higher security you need to use the full canonical username: Joe King/hacker catalog.nsf contains a list of all databases on the server + access control information The By Name view will give you a list of databases your user can access

Targeting Interesting Users

Access Control List Info

Check group members in names.nsf JTR popped this one earlier!

Getting More Access Running Commands webadmin.nsf allows an administrator to run server commands.

Getting More Access You can run O/S commands using load but can t see the results when using quick console. For some reason writing output to a web accessible directory didn t work on Linux Solution: upload a Notes database shell!

Introducing shell.nsf aka D99Shell You may get a certificate error after uploading..

D99Shell in action!

Also works on Windows servers

Demo: Breaking In! Oh Noez! U R demoin dis live!?!

Breaking in from the Inside - Objectives Find ID files on the network Crack passwords Get in to the NAB on the server Find ID files with higher levels of access Pw0nage!

Are Employees the Biggest Threat? Many breaches of security are done by insiders - Katherine Spanbauer, Domino senior product manager

Gaining A Toehold Since R5 you need an ID file to access the client ID file needs to be valid and not in a deny access group in the NAB. Shared directories FTW!

Gaining A Toehold It used to be hard to crack native Notes passwords! There are a number of products available to crack ID file passwords Huge thanks to Nataly at Passware * for the software being used in the following demo.. * http://www.lostpassword.com

Demo: Notes ID Password Cracking I can haz beerz after, right?

We re going after the payroll Our freshly cracked ID file gives catalog.nsf & names.nsf access

Check the NAB (names.nsf) for group members Oops!

The result..

Client-side Tricks Spoofing mail.. Removing restrictions of local access LotusScript can access the Windows API! Declare Function GetClipboardData Lib "User32" (Byval wformat As Long) As Long

Mail spoofing; getting a payrise! SMTP mail can be easily spoofed using telnet but document properties are a dead giveaway

The Spoof Memo Form This is all that is required:

The result Create a new mail using the evil form and copy/paste it in to the mail.box database on the spoofed user s server The only giveaway.. Looks Good..

Local Access Protection Lotus Notes has an ACL setting to Enforce consistent ACL Opening a protected database locally gives an error like this: Not this ->

I Can t Access It Locally Eh! There are companies out there selling various unlock solutions Prices for software range from $49 to $657!! I ve tested a few versions of these life saving products.. One of them changed 4 bytes, another changed 6!

I Can t Access It Locally Eh! I mentioned to colleagues @ IBM in 2004 that you could change 1 byte to remove protection These apps are doing 75% too much work! Sorry guys, the secret s out: Changing 0x000002C4 from 20 to 00 could save $700!

Tool release Local Access Protection Deprotector And No Cash Expected

Tool release: lapdance Local Access Protection Deprotector And No Cash Expected (lapdance.pl) Written in Perl (badly), gives some info about the database and can add and remove protection Available from https://www.secquest.co.uk/tools/lapdance.pl

Tool release: lapdance Local Access Protection Deprotector And No Cash Expected (lapdance.pl) Support for ODS versions 16, 17, 20, 41, 43, 48 and 51 (ie. everything from V2 to V8.5) Will display database protection and encryption flags information Can add and remove local access protection

Demo: Removing Database Protection! Ohalp! Prayrz 2 Ceilin Cat dat dis workz!

To Finish.. In this presentation I ll aim to give a general overview of Domino security and demonstrate ways of breaking in. This will cover security issues from the point of view of the web server, native Domino server and demonstrate some tricks you can use from the client side of things.

@UKFully @SecQuest