πŸ•΅οΈ
VeryLazyTech
πŸ“œ MediumπŸ›’ My ShopπŸ‘Ύ GithubπŸ“© Telegram πŸ“Ί YouTubeβœ– Twitter
  • πŸ•΅οΈWelcome!
    • VeryLazyTech
    • Support VeryLazyTech
      • πŸ‘Ύ GitHub
      • πŸ“œ Medium
      • β˜• My Shop
      • πŸ“Ί YouTube
      • βœ– Twitter
      • πŸ“© Telegram
  • πŸ›‘οΈ Vulnerabilities and Exploits
    • CVE - POC
      • Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692
      • POC - CVE-2024–4956 - Nexus Repository Manager 3 Unauthenticated Path Traversal
      • POC - CVE-2024-45241: Path Traversal in CentralSquare's CryWolf
      • Telerik Auth Bypass CVE-2024-4358
      • Check Point Security Gateways Information Disclosure - CVE-2024-24919
      • CVE-2024-23897 - Jenkins File Read Vulnerability
      • CVE-2024–10914- Command Injection Vulnerability in name parameter for D-Link NAS
      • POC - CVE-2024-21534 Jsonpath-plus vulnerable to Remote Code Execution (RCE)
      • CVE-2024-9935 - PDF Generator Addon for Elementor Page Builder <= 1.7.5 - Unauthenticated Arbitrary
      • CVE-2024-50623- Cleo Unrestricted file upload and download
      • POC - WordPress File Upload plugin, in the wfu_file_downloader.php file before version <= 4.24.11
      • POC - Remote and unauthenticated attacker can send crafted HTTP requests to RCE - cve-2025-3248
      • POCβ€Š-β€ŠCVE-2025–2539 File Away <= 3.9.9.0.1β€Š-β€ŠMissing Authorization to Unauthenticated Arbitrary File
      • POC - CVE-2025-29306 FOXCMS /images/index.html Code Execution Vulnerability
  • πŸ•΅οΈβ€β™‚οΈDorks
    • GitHub Dorks
    • Google Dork Online Tool
  • πŸ“š Resources
    • Top Hacking Books for 2024: FREE and Paid
    • How to Study for OSCP with the PWK Book PDF
    • Top 20 phishing tools to use in 2024
    • Top 8 Bug Bounty Books for 2025: Must-Reads for Ethical Hackers
    • Top Hacking Tools and Skills You Need to Learn in 2025
    • Offensive Cloud
    • Penetration Testing & Hacking Tools List
    • Top Cybersecurity Books by Topic
  • The Ultimate Penetration Testing Methodology (2025 Edition)
  • πŸ•ΈοΈPentesting Web
    • Client Side Template Injection (CSTI)
    • Identify a Server’s Origin IP
    • 2FA/MFA/OTP Bypass
  • IDOR
  • Open Redirect
  • Subdomain Takeover
  • Penetration Testing WiFi Networks
  • Client-Side Path Traversal
  • Clickjacking
  • Command Injection
  • JWT Vulnerabilities
  • Bypass rating limit
  • CORS - Misconfigurations & Bypass
  • LDAP Injection
  • File upload vulnerabilities
  • Content Security Policy (CSP) bypass
  • 🐧Linux
    • Practical Linux Commands
    • Bypassing Bash Restrictions - Rbash
    • Privilege escalation - Linux
  • Linux Environment Variables
  • πŸͺŸWindows
    • Active Directory Methodology
  • 🌐Network Pentesting
    • FTP - Port 21
    • SSH- Port 22
    • Telnet - Port 23
    • SMTP/s - Port 25,465,587
    • WHOIS - Port 43
    • TACACS+ - Port 49
    • DNS - Port 53
    • TFTP/Bittorrent-tracker - Port 69/UDP
    • Finger - Port 79
    • Web - Port 80,443
    • Kerberos - Port 88
    • POP - Port 110/995
    • Portmapper - Port 111/TCP/UDP
    • Ident - Port 113
    • NTP - Port 123/UDP
    • MSRPC - Port 135, 539
    • NetBios - Port 137,138,139
    • SMB - Port 139 445
    • IMAP - Port 143, 993
    • SNMP - Ports 161, 162, 10161, and 10162/UDP
    • IRC - Ports 194,6667,6660-7000
    • Check Point Firewall - Port 264
    • LDAP - Ports 389, 636, 3268, 3269
    • IPsec/IKE VPN - Port 500/UDP
    • Modbus - Port 502
    • Rexec - Port 512
    • Rlogin - Port 513
    • Rsh - Port 514
    • Line Printer Daemon (LPD) - Port 515
    • Apple Filing Protocol (AFP) - PORT 548
    • RTSP - Port 554, 8554
    • IPMI - Port 623/UDP/TCP
    • Internet Printing Protocol (IPP) - Port 631
    • EPP - Port 700
    • Rsync - Port 873
    • Rusersd Service - Port 1026
    • Socks - Port 1080
    • Java RMI - RMI-IIOP - Port 1098/1099/1050
    • MSSQL (Microsoft SQL Server) - Port 1433
    • Oracle TNS Listener - Port 1521,1522-1529
  • PPTP - Port 1723
  • MQTT (Message Queuing Telemetry Transport) - Port 1883
  • Compaq HP Insight Manager - Port 2301, 2381
  • NFS Service - Port 2049
  • Docker - Port 2375,2376
  • Squid - Port 3128
  • iScsi - Port 3260
  • SAPRouter - Port 3299
  • 😎Post-exploitation
    • File Transfer Cheatsheet: Windows andΒ Linux
  • πŸ§‘β€πŸ”§Technical guides
    • Kali Linux - Installation
Powered by GitBook
On this page
  • Scanning for Open Ports
  • Checking for SSL/TLS on Port 995
  • Enumerating POP3 Capabilities
  • Attempting Login Bruteforce (if authorized)
  • Testing for POP3 Vulnerabilities
  • Dangerous Settings

Was this helpful?

  1. Network Pentesting

POP - Port 110/995

PreviousKerberos - Port 88NextPortmapper - Port 111/TCP/UDP

Last updated 6 months ago

Was this helpful?

Support VeryLazyTech πŸŽ‰
  • Become VeryLazyTech ! 🎁

  • Follow us on:

    • βœ– Twitter .

    • πŸ‘Ύ Github .

    • πŸ“œ Medium .

  • Visit our for e-books and courses. πŸ“š

  • Support us and . β˜•

Pentesting POP (Post Office Protocol) services, particularly on ports 110 (POP3) and 995 (POP3S - SSL/TLS secured POP3), is essential to assess email servers' security posture. POP3 is widely used for retrieving emails from a server, and it is crucial to ensure its proper configuration and security to prevent unauthorized access and data leaks.

Default ports: 110, 995(ssl)

PORT    STATE SERVICE
110/tcp open  pop3

Scanning for Open Ports

First, identify whether the POP3 service is open on ports 110 (standard POP3) or 995 (POP3S - secure POP3 over SSL/TLS).

  1. Port Scanning with Nmap:

    nmap -p 110,995 --open <target_ip>
    • This scans the target IP for open ports 110 and 995. Confirming these ports are open indicates that POP3 services are likely running.

  2. Service Detection:

    nmap -sV -p 110,995 <target_ip>
    • The -sV flag allows Nmap to perform version detection, helping identify the specific version of the POP3 service running. This can give insight into any known vulnerabilities for that version.

Checking for SSL/TLS on Port 995

POP3S on port 995 should be using SSL/TLS encryption. Verify this to understand if secure communication is enforced.

  1. SSL Scan with Nmap:

    nmap --script ssl-cert,ssl-enum-ciphers -p 995 <target_ip>
    • This command checks for the SSL certificate and supported encryption ciphers, helping you determine if the SSL/TLS configuration is strong or outdated.

  2. Using OpenSSL to Test SSL/TLS:

    openssl s_client -connect <target_ip>:995
    • This command establishes an SSL/TLS connection to the POP3S server, allowing you to view the certificate details and encryption level. If it connects successfully, this confirms that the service is properly encrypted.

Enumerating POP3 Capabilities

Identify the supported capabilities of the POP3 service. This can reveal potential misconfigurations and features that may be exploited.

  1. Using Telnet for Plain Text POP3 (Port 110):

    telnet <target_ip> 110
    • By connecting with Telnet, you can manually interact with the POP3 service. Type CAPA after connecting to see a list of supported POP3 capabilities, such as USER, PASS, and AUTH.

  2. Manual Enumeration Commands:

    POP commands:
      USER uid           Log in as "uid"
      PASS password      Substitue "password" for your actual password
      STAT               List number of messages, total mailbox size
      LIST               List messages and sizes
      RETR n             Show message n
      DELE n             Mark message n for deletion
      RSET               Undo any changes
      QUIT               Logout (expunges messages if no RSET)
      TOP msg n          Show first n lines of message number msg
      CAPA               Get capabilities
  3. Automated Enumeration Commands:

nmap --script "pop3-capabilities or pop3-ntlm-info" -sV -port <PORT> <IP> #All are default scripts
  • The pop3-ntlm-info plugin will return some "sensitive" data (Windows versions).

Attempting Login Bruteforce (if authorized)

To test for weak credentials, you can attempt to bruteforce the POP3 login using known or guessed credentials. Use this only if authorized, as it can lock accounts and trigger alerts.

  1. Hydra for POP3 Bruteforce:

    hydra -l <username> -P <password_list> pop3://<target_ip> -s 110
    • The command above attempts login on POP3 with port 110 using a specified username and password list.

  2. POP3S Bruteforce (over SSL on port 995):

    hydra -l <username> -P <password_list> pop3s://<target_ip> -s 995
    • This command tries to authenticate over POP3S. It’s important to test for both plain and secure POP3 services if they are both available.

Testing for POP3 Vulnerabilities

Look for specific vulnerabilities associated with the POP3 server version, especially if outdated. Some common tools and methods include:

  1. SearchSploit:

    searchsploit <POP3_version>
    • SearchSploit checks for known vulnerabilities associated with the detected POP3 version. This can help identify possible exploits to use.

  2. Metasploit: Metasploit has a module for testing common POP3 vulnerabilities:

    msfconsole
    use auxiliary/scanner/pop3/pop3_version
    set RHOSTS <target_ip>
    run
    • This Metasploit module scans for the POP3 service version and some known vulnerabilities.

  3. Banner Grabbing (for version identification):

    nc -nv <target_ip> 110
    openssl s_client -connect <IP>:995 -crlf -quiet
    • Netcat connects to the POP3 service, where the initial response might include the server banner, revealing the software and version.

Sniffing POP3 Traffic (If Using Plain Text)

If the target is using unencrypted POP3 on port 110, you may be able to capture and read email credentials and messages in transit.

  1. Wireshark:

    • Capture Filter: tcp port 110

    • By setting this filter, Wireshark will capture only traffic over port 110, allowing you to inspect any unencrypted POP3 login attempts or email retrievals.

  2. tcpdump:

    tcpdump -i <interface> tcp port 110 -w pop3_traffic.pcap
    • This command captures POP3 traffic on port 110 and saves it to a .pcap file for later analysis. Inspect this file in Wireshark to view credentials and message contents if they are transmitted in clear text.

Exploiting POP3 Misconfigurations

Some POP3 servers may have misconfigurations, such as weak authentication mechanisms or default credentials. Test for these with caution.

  1. Default Credential Testing:

    • Common default POP3 credentials include admin:admin, root:root, user:password, etc. If accessible, document it as a critical vulnerability.

  2. Testing for Open Relay (unlikely but possible):

    • While primarily an SMTP issue, some misconfigured POP3 services may allow unintended access to other email services or mail relaying, typically revealing poor configuration practices.

Post-Exploitation with POP3 Access

If you successfully authenticate, retrieve emails to assess their content for sensitive information.

  1. Retrieving Emails with Telnet:

    USER <username>
    PASS <password>
    STAT
    RETR <message_number>
    • After authentication, the STAT command shows the number of messages and total storage size. Use RETR followed by a message number to retrieve specific emails.

  2. Using Python for Automated Email Retrieval:

    import poplib
    
    server = poplib.POP3('<target_ip>', 110)
    server.user('<username>')
    server.pass_('<password>')
    messages = server.list()[1]
    for message in messages:
        print("\n".join(server.retr(message.decode('utf-8'))[1]))
    server.quit()
    • This script connects to the POP3 server, logs in, and retrieves each message, which can be analyzed for sensitive information.


Dangerous Settings

Setting

Description

auth_debug

Enables all authentication debug logging.

auth_debug_passwords

This setting adjusts log verbosity, the submitted passwords, and the scheme gets logged.

auth_verbose

Logs unsuccessful authentication attempts and their reasons.

auth_verbose_passwords

Passwords used for authentication are logged and can also be truncated.

auth_anonymous_username

This specifies the username to be used when logging in with the ANONYMOUS SASL mechanism.

Support VeryLazyTech πŸŽ‰

Learn & practice

Become VeryLazyTech ! 🎁

Follow us on Twitter , Github , and Medium .

Visit our for e-books and courses. πŸ“š

Support us and . β˜•

🌐
member
@VeryLazyTech
@VeryLazyTech
@VeryLazyTech
shop
buy me a coffee
For the OSCP.
member
@VeryLazyTech
@VeryLazyTech
@VeryLazyTech
shop
buy me a coffee