SMTP Pentesting Notes
Protocol Overview
Basic Information
Protocol Components
Initial Enumeration
Port Scanning
Banner Grabbing
Authentication Testing
Testing Anonymous Access
Testing Open Relay
User Enumeration
VRFY Command
EXPN Command
RCPT TO Method
Common NSE Scripts
Brute Force Attacks
Using Hydra
Using Metasploit
SMTP Commands Reference
Command
Description
Example
Configuration Files
Server Configuration
Security Files
Common Vulnerabilities
Post Exploitation
Information Gathering
Privilege Escalation
Response Codes
Code
Meaning