CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/documentation/modules/auxiliary/scanner/smtp/smtp_version.md
Views: 11784

Description

This module grabs the banner from an SMTP server.

Vulnerable Application

Postfix on Kali Linux:

This is mainly based on the instructions from digitalocean.com. In this case, we don't need to configure all the users and set up the server fully, just enough to display a banner.

  1. apt-get install postfix

  2. Select Internet Site

  3. Select OK, the default is fine

  4. systemctl restart postfix

Verification Steps

  1. Do: use auxiliary/scanner/smtp/smtp_version

  2. Do: set rhosts [ips]

  3. Do: run

Scenarios

Postfix 3.3.0-1+b1 (Ubuntu package number) on Kali (using above config)

msf5 > use auxiliary/scanner/smtp/smtp_version msf5 auxiliary(scanner/smtp/smtp_version) > set rhosts 10.168.202.216 rhosts => 10.168.202.216 msf5 auxiliary(scanner/smtp/smtp_version) > run [+] 10.168.202.216:25 - 10.168.202.216:25 SMTP 220 rageKali.ragegroup ESMTP Postfix (Debian/GNU)\x0d\x0a