🐧
SolidState
  • Solid State
    • Summary
  • Enumeration
    • TCP
    • UDP
    • Web Services
      • Nikto
      • Dirb Extensions
      • Dirsearch
      • goBuster
      • Robots
      • WhatWeb
    • Other Services
      • SSH
      • SMTP
      • POP3
      • NNTP
      • James Remote Admin Tool
  • Exploitation
  • Priv Escalation
  • Notes
Powered by GitBook
On this page
  1. Enumeration
  2. Other Services

SMTP

PreviousSSHNextPOP3

Last updated 2 years ago

NMAP Scan

// SERVICE REASON         VERSION
25/tcp open  smtp    syn-ack ttl 63 JAMES smtpd 2.3.2
| smtp-vuln-cve2010-4344: 
|_  The SMTP server is not Exim: NOT VULNERABLE
|_smtp-commands: solidstate Hello nmap.scanme.org (10.10.14.12 [10.10.14.12])
Service Info: Host: solidstate

Version 2.3.2 James SMTPD

Potential Vulnerabilities

Although the target is vulnerable to this exploit, we are not able to execute code because it requires someone to log in via SSH.

Username Enumeration

Unfortunately the target does not support the following commands that can be used for username enumeration, EXPN, VRFY, RCPT TO.

The user root was found. We could probably try to brute force other services around this username.

Apache James Server 2.3.2 - Remote Command Execution (RCE) (Authenticated) (2)Exploit Database
Logo