1.3 KiB
1.3 KiB
Vulnerable Application
This module creates a mock POP3 server which accepts credentials.
Verification Steps
- Start msfconsole
- Do:
use auxiliary/server/capture/pop3
- Do:
run
Options
Scenarios
Testing Script
The following script will attempt a login of the server.
require 'net/pop'
puts 'Attempting Login'
Net::POP3.start('127.0.0.1', 110, 'username', 'password') do |pop|
# check for email, should be none
if pop.mails.empty?
puts 'No mail'
end
end
Output from testing script
When this script is run from the Metasploit console, it intermingles with the commands.
$ sudo ./msfconsole -qx 'use auxiliary/server/capture/pop3; set srvhost 127.0.0.1; run; ruby test_capture_pop3.rb;creds'
srvhost => 127.0.0.1
[*] Auxiliary module running as background job 0.
[*] exec: ruby test_capture_pop3.rb
[*] Started service listener on 127.0.0.1:110
[*] Server started.
Attempting Login
[+] POP3 LOGIN 127.0.0.1:35766 username / password
No mail
Credentials
===========
host origin service public private realm private_type JtR Format
---- ------ ------- ------ ------- ----- ------------ ----------
127.0.0.1 127.0.0.1 110/tcp (pop3) username password Password