mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-15 09:27:32 +00:00
commit
c68b191ef0
1 changed files with 35 additions and 0 deletions
|
@ -439,3 +439,38 @@ sendmail.cf
|
|||
submit.cf
|
||||
```
|
||||
|
||||
## HackTricks Automatic Commands
|
||||
|
||||
```
|
||||
Protocol_Name: SMTP #Protocol Abbreviation if there is one.
|
||||
Port_Number: 25,465,587 #Comma separated if there is more than one.
|
||||
Protocol_Description: Simple Mail Transfer Protocol #Protocol Abbreviation Spelled out
|
||||
|
||||
Name: Notes
|
||||
Description: Notes for SMTP
|
||||
Note: """
|
||||
SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail. However, since it is limited in its ability to queue messages at the receiving end, it is usually used with one of two other protocols, POP3 or IMAP, that let the user save messages in a server mailbox and download them periodically from the server.
|
||||
|
||||
https://book.hacktricks.xyz/pentesting/pentesting-smtp
|
||||
"""
|
||||
|
||||
Name: Banner Grab
|
||||
Description: Grab SMTP Banner
|
||||
Command: """nc -vn {IP} 25"""
|
||||
|
||||
Name: SMTP Vuln Scan
|
||||
Description: SMTP Vuln Scan With Nmap
|
||||
Command: """nmap --script=smtp-commands,smtp-enum-users,smtp-vuln-cve2010-4344,smtp-vuln-cve2011-1720,smtp-vuln-cve2011-1764 -p 25 {IP}
|
||||
|
||||
Name: SMTP User Enum
|
||||
Description: Enumerate uses with smtp-user-enum
|
||||
Command: """smtp-user-enum -M VRFY -U {Big_Userlist} -t {IP}"""
|
||||
|
||||
Name: SMTPS Connect
|
||||
Description: Attempt to connect to SMTPS two different ways
|
||||
Command: """openssl s_client -crlf -connect {IP}:465 &&&& openssl s_client -starttls smtp -crlf -connect {IP}:587"""
|
||||
|
||||
Name: Find MX Servers:
|
||||
Description: Find MX servers of an organization
|
||||
Command: """dig +short mx {Domain_Name}"""
|
||||
```
|
||||
|
|
Loading…
Reference in a new issue