02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

SMTP Enumeration 143<br />

The following commands can be used against an NTP server:<br />

■<br />

■<br />

■<br />

■<br />

ntpdate<br />

ntptrace<br />

ntpdc<br />

ntpq<br />

SMTP Enumeration<br />

Yet another effective way of gathering information from a target is through the use of<br />

SMTP. This protocol is designed to send messages between servers that send and receive<br />

e-mail. SMTP is the standard used by the majority of e-mail servers and clients today.<br />

So how is this protocol used to gather information from a server? The process is quite<br />

simple if you have a fundamental understanding of a few commands and how to use them.<br />

If you are following along and wish to execute the following commands<br />

on a Windows system, be aware that for versions later than Windows XP<br />

Microsoft does not include a telnet client. You must download the client<br />

from Microsoft (at no charge).<br />

Using VRFY<br />

One easy way to verify the existence of e-mail accounts on a server is by using the telnet<br />

command to attach to the target and extract the information. The VRFY command is<br />

used within the protocol to check whether a specific user ID is present. However, this same<br />

command can be used by an attacker to locate valid accounts for attack, and if scripted, it<br />

could also be used to extract multiple accounts in a short time, as shown here:<br />

telnet 10.0.0.1 25 (where 10.0.0.1 is the server IP and 25 is the port for SMTP)<br />

220 server1 ESMTP Sendmail 8.9.3<br />

HELO<br />

501 HELO requires domain address<br />

HELO x<br />

250 server1 Hello [10.0.0.72], pleased to meet you<br />

VRFY chell<br />

250 Super-User <br />

VRFY glados<br />

550 glados... User unknown

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!