110,995 - Pentesting POP
Learn & practice AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking:
HackTricks Training GCP Red Team Expert (GRTE)
Basic Information
Post Office Protocol (POP) is described as a protocol within the realm of computer networking and the Internet, which is utilized for the extraction and retrieval of email from a remote mail server, making it accessible on the local device. Positioned within the application layer of the OSI model, this protocol enables users to fetch and receive email. The operation of POP clients typically involves establishing a connection to the mail server, downloading all messages, storing these messages locally on the client system, and subsequently removing them from the server. Although there are three iterations of this protocol, POP3 stands out as the most prevalently employed version.
Default ports: 110, 995(ssl)
PORT STATE SERVICE
110/tcp open pop3Enumeration
Banner Grabbing
nc -nv <IP> 110
openssl s_client -connect <IP>:995 -crlf -quietManual
You can use the command CAPA to obtain the capabilities of the POP3 server.
Automated
The pop3-ntlm-info plugin will return some "sensitive" data (Windows versions).
POP syntax
POP commands examples from here
Example:
Dangerous Settings
From https://academy.hackthebox.com/module/112/section/1073
Setting
Description
auth_debug
Enables all authentication debug logging.
auth_debug_passwords
This setting adjusts log verbosity, the submitted passwords, and the scheme gets logged.
auth_verbose
Logs unsuccessful authentication attempts and their reasons.
auth_verbose_passwords
Passwords used for authentication are logged and can also be truncated.
auth_anonymous_username
This specifies the username to be used when logging in with the ANONYMOUS SASL mechanism.
HackTricks Automatic Commands
Learn & practice AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking:
HackTricks Training GCP Red Team Expert (GRTE)
Last updated