Home Security Tools Domi-Owned – IBM/Lotus Domino Exploitation

Domi-Owned – IBM/Lotus Domino Exploitation

by ethhack

To perform a reverse brute force attack against a Domino server, run Domi-Owned with the bruteforce action argument, the server URL, and a list of usernames. Optionally, a password can be specified with the –password argument. If a password is not provided, Domi-Owned will use the username, from the username list, as the account password (i.e. ‘admin:admin’ or ‘jsmith:jsmith’). Domi-Owned will then try to authenticate to ‘names.nsf’, returning successful accounts.

Example:

./domi-owned.py bruteforce http://domino-server.com usernames.txt --password PASSWORD


To dump all Domino accounts with a non-empty hash, run Domi-Owned with the hashdump action argument and the server URL. Optionally, supply Domi-Owned with a username and password using the –username and –password arguments. This will print the results to the screen and write the account hashes to separate out-files, depending on the hash type (Domino 5, Domino 6, Domino 8).

Example:

./domi-owned.py hashdump http://domino-server.com --username USERNAME 
--password PASSWORD


The Domino Quick Console is active by default; however, it will not show the output of issued commands. A workaround to this problem is to redirect the command output to a file, in this case ‘log.txt’, that is then displayed as a web page on the Domino server.

If the quickconsole action argument is given, Domi-Owned will access the Domino Quick Console, through ‘webadmin.nsf’, allowing the user to issue native Windows or Linux commands. Optionally, supply a username and password using the –username and –password arguments. Domi-Owned will then retrieve the output of the command and display the results in real time through a command line interpreter. Type exit to quit the Quick Console interpreter. Upon exit, Domi-Owned will delete the ‘log.txt’ output file.



Source link

Related Articles

Leave a Comment