SMTP Enumeration

Table of contents

  1. Vulnerability
  2. Prerequisites
  3. Exploit
  4. Useful links
  5. Recommendations

Vulnerability

TODO: Describe the vulnerability here.

Prerequisites

  • Network route to the network you want to scan.

Exploit

# Using netcat
nc -nv <TARGET> 25

# Using Test-NetConnection on Windows PowerShell
Test-NetConnection -Port 25 <TARGET>

# Using telnet
telnet <TARGET> 25
  • TODO: List links here.

Recommendations

  • TODO: List recommendations here.