Commands:
- VRFY command tells if an email address exists.
- EXPN command shows membership of mailing list
- RCPT (you’ll need a valid email for this for an exploit)
smtp-user-enum
- To verify usernames:
smtp-user-enum -M VRFY -U users.txt -t $host- host is IP or hostname
smtp-user-enum -M EXPN -u $username -t $hostsmtp-user-enum -M RCPT -U users.txt -T $hostlistsmtp-user-enum -M EXPN -D $domain -U users.txt -t $host
Swaks
Swaks (Sending email from command line when you have creds for mail server)
swaks --to <recipient@email.com> --from <sender@email.com> -ap --attach @<attachment> --server <mail server ip> --body "message" --header "Subject: Subject" --suppress-data- You will need the password of the mail server user (likely the sender)
- Note that the mail server may not be the same machine as the user who opens the email
Send email over NC
nc -v $host 25helo popMAIL FROM: user@domain(this may not need to be a real user)RCPT TO: targetUser@domaain(does need to be real)DATA- ``` Subject: RE: password reset
Hi user,
Click this link or your skip manager gets it - http://$kaliIP/
Regards,
.
```
QUITBye