autodiscover

package
v2.0.18+incompatible Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Apr 6, 2017 License: CC0-1.0 Imports: 14 Imported by: 0

Documentation

Index

Constants

This section is empty.

Variables

View Source
var SessionConfig *utils.Session

SessionConfig holds the configuration for this autodiscover session

Functions

func Autodiscover

func Autodiscover(domain string) (*utils.AutodiscoverResp, string, error)

Autodiscover function to retrieve mailbox details using the autodiscover mechanism from MS Exchange

func BruteForce

func BruteForce(domain, usersFile, passwordsFile string, basic, insecure, stopSuccess, verbose bool, consc, delay int)

BruteForce function takes a domain/URL, file path to users and filepath to passwords whether to use BASIC auth and to trust insecure SSL And whether to stop on success

func CheckCache

func CheckCache(email string) *utils.AutodiscoverResp

CheckCache checks to see if there is a stored copy of the autodiscover record

func CreateCache

func CreateCache(email, autodiscover string)

CreateCache function stores the raw autodiscover record to file

func GetMapiHTTP

func GetMapiHTTP(email, autoURLPtr string, resp *utils.AutodiscoverResp) (*utils.AutodiscoverResp, string, error)

GetMapiHTTP gets the details for MAPI/HTTP

func GetRPCHTTP

func GetRPCHTTP(email, autoURLPtr string, resp *utils.AutodiscoverResp) (*utils.AutodiscoverResp, string, string, string, bool, error)

GetRPCHTTP exports the RPC details for RPC/HTTP

func MAPIDiscover

func MAPIDiscover(domain string) (*utils.AutodiscoverResp, string, error)

MAPIDiscover function to do the autodiscover request but specify the MAPI header indicating that the MAPI end-points should be returned

func UserPassBruteForce

func UserPassBruteForce(domain, userpassFile string, basic, insecure, stopSuccess, verbose bool, consc, delay int)

UserPassBruteForce function does a bruteforce using a supplied user:pass file

Types

type InsecureRedirects

type InsecureRedirects struct {
	Transport http.RoundTripper
}

InsecureRedirects allows forwarding the Authorization header even when we shouldn't

func (InsecureRedirects) RoundTrip

func (l InsecureRedirects) RoundTrip(req *http.Request) (resp *http.Response, err error)

RoundTrip custom redirector that allows us to forward the auth header, even when the domain changes. This is needed as some office365 domains will redirect from autodiscover.domain.com to autodiscover.outlook.com and Go does not forward Sensitive headers such as Authorization (https://golang.org/src/net/http/client.go#41)

type Result

type Result struct {
	Username string
	Password string
	Index    int
	Status   int
	Error    error
}

Result struct holds the result of a bruteforce attempt

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL