documentation/modules/auxiliary/scanner/msmail/host_id.md
OWA (Outlook Webapp) is vulnerable to time-based user enumeration attacks. This module leverages all known, and even some lesser-known services exposed by default Exchange installations to enumerate users. It also targets Office 365 for error-based user enumeration.
Identify Command
Note: Currently uses RHOSTS which resolves to an IP which is NOT desired, this is currently being fixed
msfconsoleuse auxiliary/scanner/msmail/host_idset RHOSTS <target>runResults should look like below:
msf > use auxiliary/scanner/msmail/host_id
msf auxiliary(scanner/msmail/host_id) > set RHOSTS <host>
RHOSTS => <host>
msf auxiliary(scanner/msmail/host_id) > run
[*] Running for <ip>...
[*] Attempting to harvest internal domain:
[*] Internal Domain:
[*] <domain>
[*] [-] Domain is not using o365 resources.
[*] Identifying endpoints vulnerable to time-based enumeration:
[*] [+] https://<host>/Microsoft-Server-ActiveSync
[*] [+] https://<host>/autodiscover/autodiscover.xml
[*] [+] https://<host>/owa
[*] Identifying exposed Exchange endpoints for potential spraying:
[*] [+] https://<host>/oab
[*] [+] https://<host>/ews