Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
Test ID: | 1.3.6.1.4.1.25623.1.0.104113 |
Category: | Nmap NSE net |
Title: | Nmap NSE net: smtp-enum-users |
Summary: | Attempts to enumerate the users on a SMTP server by issuing the VRFY, EXPN or RCPT TO commands. The;goal of this script is to discover all the user accounts in the remote system.;;The script will output the list of user names that were found. The script will stop querying the;SMTP server if authentication is enforced. If an error occurs while testing the target host, the;error will be printed with the list of any combinations that were found prior to the error.;;The user can specify which methods to use and in which order. The script will ignore repeated;methods. If not specified the script will use the RCPT first, then VRFY and EXPN. An example of how;to specify the methods to use and the order is the following:;;'smtp-enum-users.methods={EXPN, RCPT, VRFY}';;SYNTAX:;;userdb: The filename of an alternate username database.;;smtp-enum-users.domain: Define the domain to be used in the SMTP commands;;unpwdb.passlimit: The maximum number of passwords;'passwords' will return (default unlimited).;;unpwdb.userlimit: The maximum number of usernames;'usernames' will return (default unlimited).;;unpwdb.timelimit: The maximum amount of time that any iterator will run;before stopping. The value is in seconds by default and you can follow it;with 'ms', 's', 'm', or 'h' for;milliseconds, seconds, minutes, or hours. For example,;'unpwdb.timelimit=30m' or 'unpwdb.timelimit=.5h' for;30 minutes. The default depends on the timing template level (see the module;description). Use the value '0' to disable the time limit.;;smtp-enum-users.methods: Define the methods and order to be used by the script (EXPN, VRFY, RCPT);;passdb: The filename of an alternate password database. |
Description: | Summary: Attempts to enumerate the users on a SMTP server by issuing the VRFY, EXPN or RCPT TO commands. The goal of this script is to discover all the user accounts in the remote system. The script will output the list of user names that were found. The script will stop querying the SMTP server if authentication is enforced. If an error occurs while testing the target host, the error will be printed with the list of any combinations that were found prior to the error. The user can specify which methods to use and in which order. The script will ignore repeated methods. If not specified the script will use the RCPT first, then VRFY and EXPN. An example of how to specify the methods to use and the order is the following: 'smtp-enum-users.methods={EXPN, RCPT, VRFY}' SYNTAX: userdb: The filename of an alternate username database. smtp-enum-users.domain: Define the domain to be used in the SMTP commands unpwdb.passlimit: The maximum number of passwords 'passwords' will return (default unlimited). unpwdb.userlimit: The maximum number of usernames 'usernames' will return (default unlimited). unpwdb.timelimit: The maximum amount of time that any iterator will run before stopping. The value is in seconds by default and you can follow it with 'ms', 's', 'm', or 'h' for milliseconds, seconds, minutes, or hours. For example, 'unpwdb.timelimit=30m' or 'unpwdb.timelimit=.5h' for 30 minutes. The default depends on the timing template level (see the module description). Use the value '0' to disable the time limit. smtp-enum-users.methods: Define the methods and order to be used by the script (EXPN, VRFY, RCPT) passdb: The filename of an alternate password database. CVSS Score: 4.0 CVSS Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N |
Copyright | Copyright (C) 2011 NSE-Script: The Nmap Security Scanner; NASL-Wrapper: Greenbone Networks GmbH |
This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |