SMTP (25, 465)

ko-fi

Nmap

nmap -Pn -sV -sC -p25,143,110,465,587,993,995 10.129.203.12

OpenSMTPD up to version 6.6.2:

Evolution usage

IMAP POP3 (110, 143, 993, 995)

Telnet

HELO/EHLO

VRFY

The command VRFY can be used to enumerate existing users on the system.

EXPN

EXPN is similar to VRFY, except that when used with a distribution list, it will list all users on that list. This can be a bigger problem than the VRFY command since sites often have an alias such as "all."

RCPT

User enumeration

Nmap

Metasploit

smtp-user-enum

We can specify the enumeration mode with the argument -M followed by VRFY, EXPN, or RCPT, and the argument -U with a file containing the list of users we want to enumerate. Depending on the server implementation and enumeration mode, we need to add the domain for the email address with the argument -D. Finally, we specify the target with the argument -t.

With exegol

smtp-user-enum -U users.list inlanefreight.htb 25 -m RCPT -d 'inlanefreight.htb'

References

Brute force login

SMTP Bruteforce

Send an Email

Telnet

Swaks

Phishing

Open Relay

Nmap

Swaks

Resources

Interesting Books

Interesting Books

Disclaimer: As an Amazon Associate, I earn from qualifying purchases. This helps support this GitBook project at no extra cost to you.

  • Nmap Network Scanning The official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book by Nmap's original author suits all levels of security and networking professionals.

  • The Art of Network Penetration Testing A guide to simulating an internal security breach. You’ll take on the role of the attacker and work through every stage of a professional pentest, from information gathering to seizing control of a system and owning the network.

  • Network Basics for Hackers The book offers one of the most complete and in-depth analyses of Wi-Fi and Bluetooth networks, then progresses through the various protocols such as DNS, ARP, SMTP, and others.

Support this Gitbook

I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.

ko-fi

buymeacoffee

Last updated