Scanning Mail Servers

This chapter covers the following recipes:

  • Detecting SMTP open relays
  • Brute forcing SMTP passwords
  • Detecting suspicious SMTP servers
  • Enumerating SMTP usernames
  • Brute forcing IMAP passwords
  • Retrieving the capabilities of an IMAP server
  • Brute forcing POP3 passwords
  • Retrieving the capabilities of a POP3 server
  • Retrieving information from SMTP servers with NTLM authentication

Get Nmap: Network Exploration and Security Auditing Cookbook - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.