54 lines
1.3 KiB
Markdown
54 lines
1.3 KiB
Markdown
## Vulnerable Application
|
|
|
|
This module creates a mock POP3 server which accepts credentials.
|
|
|
|
## Verification Steps
|
|
|
|
1. Start msfconsole
|
|
2. Do: ```use auxiliary/server/capture/pop3```
|
|
3. Do: ```run```
|
|
|
|
## Options
|
|
|
|
## Scenarios
|
|
|
|
### Testing Script
|
|
|
|
The following script will attempt a login of the server.
|
|
|
|
```
|
|
require 'net/pop'
|
|
|
|
puts 'Attempting Login'
|
|
Net::POP3.start('127.0.0.1', 110, 'username', 'password') do |pop|
|
|
# check for email, should be none
|
|
if pop.mails.empty?
|
|
puts 'No mail'
|
|
end
|
|
end
|
|
```
|
|
|
|
### Output from testing script
|
|
|
|
When this script is run from the Metasploit console, it intermingles with the commands.
|
|
|
|
```
|
|
$ sudo ./msfconsole -qx 'use auxiliary/server/capture/pop3; set srvhost 127.0.0.1; run; ruby test_capture_pop3.rb;creds'
|
|
srvhost => 127.0.0.1
|
|
[*] Auxiliary module running as background job 0.
|
|
[*] exec: ruby test_capture_pop3.rb
|
|
|
|
[*] Started service listener on 127.0.0.1:110
|
|
[*] Server started.
|
|
Attempting Login
|
|
[+] POP3 LOGIN 127.0.0.1:35766 username / password
|
|
No mail
|
|
Credentials
|
|
===========
|
|
|
|
host origin service public private realm private_type JtR Format
|
|
---- ------ ------- ------ ------- ----- ------------ ----------
|
|
127.0.0.1 127.0.0.1 110/tcp (pop3) username password Password
|
|
|
|
```
|