Tag: email

Footprinting, Penetration Testing

EmailHarvester 1.2.6

EmailHarvester is a tool to retrieve Domain email addresses from Search Engines. Requirements * Python 3.x * termcolor * colorama * requests Features * Retrieve Domain email addresses from Search Engines (Google, Bing, Yahoo, ASK). * Export results to txt and xml files. * Limit search results. * Define your own User-Agent string. * Use …

Information Gathering, Metasploit, Reconnaissance

Email harvesting with Metasploit

Email harvesting is the process of obtaining lists of email addresses using various methods. You can check on your own what emails, attackers are going to find about your domain using Metasploit’s module, Search Engine Domain Email Address Collector. This module uses Google, Bing and Yahoo to create a list of valid email addresses for …

Sniffing, Wireshark

Sniffing email passwords with Wireshark

> Open Wireshark.   > Select an interface and start capturing in promiscuous mode.   > To capture credentials from POP apply this filter: pop.request.command == "USER" || pop.request.command == "PASS"pop.request.command == "USER" || pop.request.command == "PASS"   > To capture credentials from IMAP apply this filter: imap.request contains "login"imap.request contains "login"   > To …

PHP

Send email with php

Sending email with PHP and build-in function mail. $to = "example@gmail.com"; $subject = "Test"; $body = "<b>Body</b> <i>of your message</i><br>"; $headers = "From: Georgern"; $headers .= "Reply-To: info@myserver.comrn"; $headers .= "Return-Path: info@myserver.comrn"; $headers .= "X-Mailer: PHP5n"; $headers .= ‘MIME-Version: 1.0’ . "n"; $headers .= ‘Content-type: text/html; charset=iso-8859-1’ . "rn"; mail($to,$subject,$body,$headers);$to = "example@gmail.com"; $subject = "Test"; …

Cracking, Email, General, Passwords, Physical security, Vulnerabilities, WEB

1 xor 1 = 0 | How Apple and Amazon Security Flaws Led to an Epic Hacking

Password-based security mechanisms —which can be cracked, reset, and socially engineered— no longer suffice in the era of cloud computing. … The very four digits that Amazon considers unimportant enough to display in the clear on the Web are precisely the same ones that Apple considers secure enough to perform identity verification.‪ http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/

Email

How to send encrypted emails

We are going to see how we can send encrypted emails using thunderbird, Enigmail and OpenPGP standard. 1. Download & Install GnuPG. You will find it here or sudo apt-get install gnupg for ubuntu users. 2. Download & Install Thunderbird. You will find it here or sudo apt-get install thunderbird for ubuntu users. 3. Download …