Tufan Turhan
  • Introduction
  • Red Teaming
    • Initial Access
      • VoipHopper
      • SMB – SCF File Attacks
      • MITM6
      • LLMNR, NBT-NS, mDNS Zehirlemeleri ve Relay Ataklar
    • Responder - DNS Injection
    • Privilege Escalation
      • PrintNightmare
      • Juicy Potato ile Windows Yetki Yükseltme
      • Token Impersonation with Incognito
    • Active Directory & Kerberos
      • Kerberos
      • Kerberosting
      • AS-REP Roasting
      • Overpass The Hash/Pass The Key (PTK)
      • DCSync Attack
      • DCShadow Attack
      • GETTGT
      • Golden Tickets
      • Silver Tickets
      • PowerView
      • MS14-025 (GPP Abusing)
      • BloodHound
      • Procdump
    • Lateral Movement
      • RDP MiTM-Hijacking
      • Vlan Hopping
      • Pivoting
    • Network Pentest
      • IPv4 Subnet Cheat Sheet
      • DNS Spoofing
      • DHCP Rogue
    • Shell to Meterpreter
    • Turn Off or Bypass AV
    • Useful CMD or Powershell Command
    • Brute Force
    • Windows Dosya İndirme
    • Windows UAC Bypass
    • Insecure Dosya İzni
  • Pentesting
    • Pentesting FTP - 21
    • Pentesting SMTP - 25,465,587
    • Pentesting SMB - 139 & 445
    • Pentesting Telnet - 23
    • Pentesting DNS - 53
    • Pentesting MSRPC -135
    • Pentesting SNMP - 161,162
    • Pentesting LDAP - 389,636
    • Pentesting MSSQL - 1433
    • Pentesting MYSQL - 3306
    • Pentesting RDP - 3389
    • Pentesing WINRM 5985,5986
  • Web Application
    • 2FA/OTP Bypass
    • Captcha Bypass
    • Cache Poisoning
    • Command Injection (OS)
    • CRLF Injection
    • Cross-site WebSocket hijacking (CSWSH) -
    • Cross-site request forgery (CSRF) -
    • Dangling Markup -
    • Path traversal
    • File Upload
    • Formula Injection (CSV Injection)
    • Login Bypass List
    • OAuth -
    • Open Redirect
    • Race Condition -
    • Registration - Password Reset & Takeover Vulnerabilities
    • SQL Injection
    • SSRF
  • Linux Privilege Escalation
    • PHP Wrapper
    • Simple Http
    • Editing /etc/passwd
    • SUID Binaries
    • Sudo Rights
    • Otomatize Araçlar
    • OSCP Not
  • HTB
  • Reverse Shell w/Msfvenom
  • Upgrading Simple Shells to Fully Interactive TTYs
Powered by GitBook
On this page
  • Find Mail Server
  • Banner Grabbing
  • Mail Relay
  • SMTP nmap scripts
  • Automatic Tools
  • Send E-Mail From Shell
  1. Pentesting

Pentesting SMTP - 25,465,587

PreviousPentesting FTP - 21NextPentesting SMB - 139 & 445

Last updated 3 years ago

Find Mail Server

Mail sunucularının ipleri genellikle testlerde verilir. Verilmediği durumlarda bunu "dig" kullanarak bulabiliriz.

dig mx gmail.com

Banner Grabbing

nc -nv <IP address> 25

Mail Relay

telnet 10.10.10.10 25
EHLO domain.com #telnet ile bağlanmaya çalıştığımızda burada domaini yada ipyi verir.
VRFY username@localhost
mail from: mailadresi@domain.com
rcpt to: denemamail@localhost
data
telnet 10.10.10.10 25
EHLO domain.com #telnet ile bağlanmaya çalıştığımızda burada domaini yada ipyi verir.
mail from: mailadresi@domain.com
rcpt to: denemamail@localhost
data
nmap -p 25 --script=smtp-open-relay 10.10.10.10

SMTP nmap scripts

nmap --script smtp-commands,smtp-enum-users,smtp-vuln-cve2010-4344,smtp-vuln-cve2011-1720,smtp-vuln-cve2011-1764 -p 25 10.10.10.10

Automatic Tools

Metasploit: auxiliary/scanner/smtp/smtp_enum
smtp-user-enum: smtp-user-enum -M <MODE> -u <USER> -t <IP>
smtp-user-enum -M VRFY -U /root/Desktop/user.txt -t 10.10.10.10

Send E-Mail From Shell

root@kali:~# sendEmail -t victimmail@victim.com -f frommail@fmail.com -s 10.10.10.10 -u Title of Mail -a /root/Desktop/filname.pdf