Tag: Metasploit

  • Exploiting SMTP

    Exploiting SMTP

    (Continuation of Part 2) For the next network security challenge, I will be testing my skills against a vulnerable SMTP server. SMTP (Simple Mail Transfer Protocol) is one of a few application-layer protocols powering e-mail services, along with POP (Post Office Protocol) and IMAP (Internet Message Access Protocol), with SMTP being primarily responsible for sending…