Linchakin

KnockOutlook - A Little Tool To Play With Outlook

 September 03, 2021     No comments   

"The best feeling is to win by knockout." - Nonito Donaire


Overview

KnockOutlook is a C# project that interacts with Outlook's COM object in order to perform a number of operations useful in red team engagements.

Command Line Usage
metadata of every account search : search for the provided keyword in every mailbox save : save a specified mail by its EntryID Examples: KnockOutlook.exe --operation check KnockOutlook.exe --operation contacts KnockOutlook.exe --operation mails --bypass KnockOutlook.exe --operation search --keyword password KnockOutlook.exe --operation save --id {EntryID} --bypass ">
      __ __                  __   ____        __  __            __
/ //_/____ ____ _____/ /__/ __ \__ __/ /_/ /___ ____ / /__
/ ,< / __ \/ __ \/ ___/ //_/ / / / / / / __/ / __ \/ __ \/ //_/
/ /| |/ / / / /_/ / /__/ ,< / /_/ / /_/ / /_/ / /_/ / /_/ / ,<
/_/ |_/_/ /_/\____/\___/_/\_\\____/\__,_/\__/_/\____/\____/_/\_\
Parameters:
--operation : specify the operation to run
--keyword : specify a keyword for the 'search' operation
--id : specify an EntryID for the 'save' operation
--bypass : bypass the Programmatic Access Security settings (requires admin)


Operations:
check : perform a number of checks to ensure operational security
contacts : extract all contacts of every account
mails : extract mailbox metadata of every account
search : search for the provided keyword in every mailbox
save : save a specified mail by its EntryID


Examples:
KnockOutlook.exe --operation check
KnockOutlook.exe --operation contacts
KnockOutlook.exe --operation mails --bypass
KnockOutlook.exe --operation search --keyword password
KnockOutlook.exe --operation save --id {EntryID} --bypass



Operations
  • check

    Enumerates the Outlook installation details in order to construct the correct registry key and retrieve the Programmatic Access Security setting.

    If this value is set to Warn when antivirus is inactive or out-of-date it queries WMI for any installed antivirus products and parses their current state.

  • contacts

    Enumerates the contacts of every configured account and extracts the following information:

    • Full Name
    • Email Address
  • mails

    Enumerates the mails of every configured account and extracts the following metadata:

    • ID
    • Timestamp
    • Subject
    • From
    • To
    • Attachments
  • search

    Searches inside the mailbox of every configured account using Outlook's built-in search engine and returns the EntryID of mails that contain the provided keyword in their body.

  • save

    Uses Outlook's built-in Save As mechanism to export a mail referenced by its EntryID.


Object Model Guard Bypass

The --bypass switch can be used in conjunction with contacts, mails, search and save operations given the fact that the current process is running with high integrity level.

It will attempt to snapshot the current security policy of Outlook, patch it in a way that the Programmatic Access Security prompt is auto-allowed and finally revert it to its initial state after the operation has finished.


Output

All operations will output basic information on screen.

The contacts and mails operations will output results in JSON format to a Gzip compressed file.

The save operation will export the requested mail in .MSG format.

All filenames are randomly generated during runtime.

By default, Outlook's Secure Temp Folder is used as a destination for all exported files.


Authors

Adblock test (Why?)


You may be interested in:
>> Is a Chromebook worth replacing a Windows laptop?
>> Find out in detail the outstanding features of Google Pixel 4a
>> Top 7 best earbuds you should not miss

Related Posts:
>> Recognizing 12 Basic Body Shapes To Choose Better Clothes
>>Ranking the 10 most used smart technology devices
>> Top 5+ Best E-readers: Compact & Convenient Pen
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
Email ThisBlogThis!Share to XShare to Facebook

Related Posts:

  • CISSP - Tales of the UnexpectedWe have all heard the old adage how big surprises can come in small packages. If you are a candidate who is studying for the CISSP exam, or if you are… Read More
  • National Small Business Week: 10 Best Practices for Small Business CybersecurityA recent survey conducted by CNBC and Momentive found that 56% of small business owners are not concerned about being the victim of a cyberattack in t… Read More
  • How I Integrated Cucumber Framework into a Test Project for BDD Implementation Cucumber Framework performs well in BDD implementation. Many companies are using BDD to develop test projects in development teams. I'll tell y… Read More
  • 15th Sep - Python program to find the nth Fibonacci NumberIn the following tutorial, we will understand how to find the nth Fibonacci Number using Python. We can define a Fibonacci Number, where the following… Read More
  • 15th Sep - nsetools in PythonIn the following tutorial, we will discuss the nsetools library in the Python programming language. We will understand its features and work with some… Read More
Newer Post Older Post Home

0 Comments:

Post a Comment


Copyright © 2025 Linchakin | Powered by Blogger
Design by Hardeep Asrani | Blogger Theme by NewBloggerThemes.com | Distributed By Gooyaabi Templates