metasploit-framework/documentation/modules/auxiliary/server/capture/pop3.md

54 lines
1.3 KiB
Markdown

## Vulnerable Application
This module creates a mock POP3 server which accepts credentials.
## Verification Steps
1. Start msfconsole
2. Do: ```use auxiliary/server/capture/pop3```
3. Do: ```run```
## Options
## Scenarios
### Testing Script
The following script will attempt a login of the server.
```
require 'net/pop'
puts 'Attempting Login'
Net::POP3.start('127.0.0.1', 110, 'username', 'password') do |pop|
# check for email, should be none
if pop.mails.empty?
puts 'No mail'
end
end
```
### Output from testing script
When this script is run from the Metasploit console, it intermingles with the commands.
```
$ sudo ./msfconsole -qx 'use auxiliary/server/capture/pop3; set srvhost 127.0.0.1; run; ruby test_capture_pop3.rb;creds'
srvhost => 127.0.0.1
[*] Auxiliary module running as background job 0.
[*] exec: ruby test_capture_pop3.rb
[*] Started service listener on 127.0.0.1:110
[*] Server started.
Attempting Login
[+] POP3 LOGIN 127.0.0.1:35766 username / password
No mail
Credentials
===========
host origin service public private realm private_type JtR Format
---- ------ ------- ------ ------- ----- ------------ ----------
127.0.0.1 127.0.0.1 110/tcp (pop3) username password Password
```