SMTP
Learning Objectives
Attack Surface Overview
# Common Vectors (Enhanced)
- Misconfigurations (open relay, anonymous VRFY/EXPN, weak TLS)
- User enumeration (VRFY/RCPT, cloud API leaks)
- Password attacks (brute-force, spraying, credential stuffing from breaches)
- Protocol exploits (SMTP smuggling, STARTTLS downgrade)
- Vulnerabilities (RCE in proxies, auth bypass in plugins)
- Spoofing/phishing (bypassing SPF/DKIM/DMARC)
- **New:** OAuth misconfigs (token replay in O365/GWS)
- **New:** Metadata exfil (e.g., via IMAP searches for PII)
- **New:** Supply-chain (vulnerable plugins like Post SMTP in WordPress)Enumeration (Stealth β Aggressive)
Authentication & Misconfigurations
Cloud Enumeration & Attacks
Password Attacks
Protocol-Specific Attacks
Latest CVEs (2024β2025) (Updated)
Post-Exploitation & Persistence
Key Commands Summary (Copy-Paste Ready)
Prep & Practice Plan
Last updated