IMAP/POP3 Pentesting Notes
Protocol Overview
Basic Information
Protocol Differences
Feature
IMAP
POP3
Initial Enumeration
Port Scanning
Banner Grabbing
Authentication Testing
IMAP Authentication
POP3 Authentication
Brute Force Attacks
Using Hydra
Using Metasploit
Command Reference
IMAP Commands
Command
Description
Example
POP3 Commands
Command
Description
Example
Common NSE Scripts
SSL/TLS Testing
Configuration Files
Server Configuration
Security Files
Common Vulnerabilities
Post Exploitation
Information Gathering
Privilege Escalation
Response Codes
IMAP Response Codes
Code
Meaning
POP3 Response Codes
Code
Meaning