News & Events
Hope everyone is safe and Secure
In this series of Blogs, we will be learning how to do Email Penetration Testing. Methodology to carry out in Pentesting Email
We will be doing lots of Things in this Series of Blogs. They are
- Introduction to Email Security
- Commonly Used Email Service Protocols
- Prerequisites for Email Penetration Testing
- Email Pentesting Steps
- SMTP Fingerprinting
- Directory Harvesting Attacks
- NTLM Overflows Attack
- Crack Email Passwords
- Checking against Phishing and Spamming Attack
- Perform Email bombing
- Check against CLSID Extension and VBS attachment Vulnerability
- Performing Fragmented Message vulnerability Test
So Let’s Dive in
Today we are going to see first Four Steps of our Objective only.
INTRODUCTION TO EMAIL SECURITY
These days People tend to store their Private Information, Business Information in Emails as Repositories.
Everyone is using Internet and Email These days, that’s what gives Confidence to hackers as well. Attackers can find ways easily to compromise the security of Email Systems and access the user’s Sensitive Information.
COMMONLY USED EMAIL SERVICE PROTOCOLS
|SMTP||25/TCP||Simple Mail Transfer Protocol, standard for email transmission|
|ESMTP||587/TCP||Extended or Enhanced SMTP, Used for Internet Mail Transfer such as Inter-server mail Transfer or mail submission protocol|
|SSMTP||465/TCP||Send only program that sends mail from a local computer to a mail server.|
|POP2||109/TCP||Application layer Internet protocol that receives messages from a remote server and relies on SMTP|
|POP3||110/TCP||Same as POP2 but doesn’t need SMTP|
|POP3S||995/TCP||It receives SMS from remote server through SSL or TLS|
|IMAP2||143/TCP||That allows client to access emails residing on a remote mail server|
|IMAPS||993/TCP||Connects to remote server Over SSL|
|SUBMISSION||587/TCP||Similar to SMTP for transmitting outgoing mails to a remote server|
PREREQUISITES FOR EMAIL PENETRATION TESTING
- Should Possess the Knowledge of Email Terminology and Concepts.
- Official documents giving you Permission to test the Email Security of the Client Organization
- Clearly read Rules of Engagement (ROE) before proceeding.
- Armory of Tools
- Incase if it is a white Box testing
- Common email Policy of Organization & how it is maintained
- Official Mail Server IP address, domain Name, etc.
- A test email ID and address to perform penetration testing.
STEPS FOR EMAIL PENETRATION TESTING
STEP1 : Perform SMTP Service Fingerprinting.
STEP2 : Perform directory Harvest Attacks
STEP3: Enumerate enabled SMTP subsystems and features
STEP4: Perform SMTP Password Bruteforcing
STEP5: Perform NTLM overflows attack through SMTP authentication
STEP6: Test for SMTP open relay
STEP7: SMTP User Enumeration
STEP8: Perform POP3 password brute-forcing
STEP9: Perform IMAP brute-forcing.
STEP10: Test for IMAP process manipulation attack
STEP11: Check for known vulnerabilities in mail servers and hosts
STEP12: Check the patch status of mail server and host systems
STEP13: Try to crack email passwords
STEP14:Check whether anti-Phishing tools are enabled
STEP15:Check whether anti-spamming tools are enabled
STEP16:Try to perform email bombing
STEP17:Perform CLSID extension vulnerability test
STEP18:Perform VBS attachment Vulnerability Test
STEP19:Perform double file extension vulnerability test
STEP20:Perform long file name vulnerability test
STEP21:Perform malformed file extension vulnerability test
STEP22: Perform access exploit vulnerability test
STEP23:Perform fragmented message vulnerability test
STEP24:Perform long subject attachment checking test
STEP25:Perform no file attachment vulnerability test
We will be performing all the steps to Email penetration Testing in the Upcoming Blogs
Stay tuned with our Pentesting Series of Blogs.
Learn more, secure enough.
Sam Nivethan V J
Security Analyst & Infosec Train