Port 25 (SMTP)
Banner Grabbing/Basic connection
nc -vn <IP> 25
telnet <IP> 25NMAP Scanning
sudo nmap 10.129.14.128 -sC -sV -p25
nmap --script=smtp-commands,smtp-enum-users,smtp-vuln-cve2010-4344,smtp-vuln-cve2011-1720,smtp-vuln-cve2011-1764 -p 25 {IP}Open Relay
sudo nmap 10.129.14.128 -p25 --script smtp-open-relay -vNTLM Auth - Information disclosure
If the server supports NTLM auth (Windows) you can obtain sensitive info (versions). More info here.
root@kali: telnet example.com 587
220 example.com SMTP Server Banner
>> HELO
250 example.com Hello [x.x.x.x]
>> AUTH NTLM 334
NTLM supported
>> TlRMTVNTUAABAAAAB4IIAAAAAAAAAAAAAAAAAAAAAAA=
334 TlRMTVNTUAACAAAACgAKADgAAAAFgooCBqqVKFrKPCMAAAAAAAAAAEgASABCAAAABgOAJQAAAA9JAEkAUwAwADInternal server name - Information disclosure
Some SMTP servers auto-complete a sender's address when command "MAIL FROM" is issued without a full address, disclosing its internal name:
Username Bruteforce Enumeration
Authentication is not always needed
RCPT TO
VRFY
The command VRFY can be used to enumerate existing users on the system. However, this does not always work.
EXPN
Send e-mail
smtp-user-enum
Last updated