rapid7/metasploit-framework

View on GitHub
documentation/modules/auxiliary/server/capture/pop3.md

Summary

Maintainability
Test Coverage
## Vulnerable Application

This module creates a mock POP3 server which accepts credentials.

## Verification Steps

  1. Start msfconsole
  2. Do: ```use auxiliary/server/capture/pop3```
  3. Do: ```run```

## Options

## Scenarios

### Testing Script

The following script will attempt a login of the server.

```
require 'net/pop'

puts 'Attempting Login'
Net::POP3.start('127.0.0.1', 110, 'username', 'password') do |pop|
  # check for email, should be none
  if pop.mails.empty?
    puts 'No mail'
  end
end
```

### Output from testing script

When this script is run from the Metasploit console, it intermingles with the commands.

```
$ sudo ./msfconsole -qx 'use auxiliary/server/capture/pop3; set srvhost 127.0.0.1; run; ruby test_capture_pop3.rb;creds'
srvhost => 127.0.0.1
[*] Auxiliary module running as background job 0.
[*] exec: ruby test_capture_pop3.rb

[*] Started service listener on 127.0.0.1:110 
[*] Server started.
Attempting Login
[+] POP3 LOGIN 127.0.0.1:35766 username / password
No mail
Credentials
===========

host       origin     service         public    private   realm  private_type  JtR Format
----       ------     -------         ------    -------   -----  ------------  ----------
127.0.0.1  127.0.0.1  110/tcp (pop3)  username  password         Password      

```