Email Services (IMAP/POP3)
Overview
IMAP vs POP3 Differences
Feature
IMAP
POP3
Port Overview
Service
Port
Description
Protocol Commands
IMAP Commands
Command
Description
POP3 Commands
Command
Description
Dangerous Settings
Setting
Description
Risk Level
Enumeration Techniques
1. Service Detection
2. Banner Grabbing
3. SSL Certificate Analysis
4. Service Capabilities
Advanced Enumeration
Using OpenSSL for Encrypted Connections
Using cURL for IMAP/POP3 Testing
SSL Certificate Information Extraction
Authentication Testing
IMAP Enumeration
Basic IMAP Commands
IMAP Enumeration Session
POP3 Enumeration
Basic POP3 Commands
POP3 Enumeration Session
Information Gathering
SSL Certificate Analysis
Email Header Analysis
Practical Examples
HTB Academy Style Enumeration
HTB Academy Lab Questions Examples
Custom Version Detection
Certificate Information Extraction
Security Assessment
Common Vulnerabilities
Authentication Testing
Enumeration Checklist
Initial Discovery
Information Gathering
Authentication Testing
Content Analysis
Tools and Techniques
Essential Tools
Custom Scripts
Defensive Measures
Secure Configuration
Best Practices
Detection and Monitoring
Common Attack Vectors
1. Credential Brute Force
2. Information Disclosure
3. Man-in-the-Middle
Last updated