metasploit-framework/documentation/modules/auxiliary/scanner/smtp/smtp_version.md

1.1 KiB

Description

This module grabs the banner from an SMTP server.

Vulnerable Application

Postfix on Kali Linux:

This is mainly based on the instructions from digitalocean.com. In this case, we don't need to configure all the users and set up the server fully, just enough to display a banner.

  1. apt-get install postfix
  2. Select Internet Site
  3. Select OK, the default is fine
  4. systemctl restart postfix

Verification Steps

  1. Do: use auxiliary/scanner/smtp/smtp_version
  2. Do: set rhosts [ips]
  3. Do: run

Scenarios

Postfix 3.3.0-1+b1 (Ubuntu package number) on Kali (using above config)

msf5 > use auxiliary/scanner/smtp/smtp_version 
msf5 auxiliary(scanner/smtp/smtp_version) > set rhosts 10.168.202.216
rhosts => 10.168.202.216
msf5 auxiliary(scanner/smtp/smtp_version) > run

[+] 10.168.202.216:25     - 10.168.202.216:25 SMTP 220 rageKali.ragegroup ESMTP Postfix (Debian/GNU)\x0d\x0a