SMTP User Enumeration MX Record

1 month ago 32
BOOK THIS SPACE FOR AD
ARTICLE AD

Hacker Halt

Hello, I’m Hackerhalt, a Red Teamer dedicated to exploring and identifying security vulnerabilities for educational purposes. Please note that this website is not affiliated with any bug bounty programs, whether public or private. As a full-time cybersecurity trainer and YouTube content creator, I aim to enhance security awareness and practices through my findings. Thank you for visiting!

example.com is a website due to some reason i am not showing a Real Domains. :)

╭─hackerhalt@CTF in ~ via  v3.12.7 took 0s
╰─λ dig +short Example.com MX

10 smtw2.xxxxxx.com.
20 smtw1.xxxxxxx.com.
50 smtpw.xxxxxxxxxx.com.
60 smtw.xxxxxxxxxxx.com.
70 smtpqr1.xxxxxxxxxxxxxxxxx.com.

Here we Have a Five MX Record of a example.com Company here Two MX Record Are vulnerable to SMTP User-Enum

nmap -p25 --script smtp-enum-users.nse smtw2.xxxxxx.com -Pn

PORT STATE SERVICE
25/tcp open smtp
| smtp-enum-users:
| RCPT, root
| RCPT, admin
| RCPT, administrator
| RCPT, webadmin
| RCPT, sysadmin
| RCPT, netadmin
| RCPT, guest
| RCPT, user
| RCPT, web
|_ RCPT, test

Here We get The Valid Username of a SMPT Server User. This Username List we use a Usename.txt for Password Cracking using Hydra , Medusa , CrackMapExec or Any Bruteforce Attack.

YouTube : https://www.youtube.com/@hackerhaltLiveTarget

Email : hackerhalt02@gmail.com

Linkedin : https://www.linkedin.com/in/hacker-halt-live/

Thank You Guys :)

Read Entire Article