当前位置:网站首页>6-11 vulnerability exploitation - use the built environment to send emails
6-11 vulnerability exploitation - use the built environment to send emails
2022-07-25 01:45:00 【Mountain Rabbit 1】

We can have a look , What's under the email
ls
cd mail/
ls
cat Sent

This is the time , Will send the original email message
Before sending , We need to add corresponding users
sudo adduser test1
Y

This is the time , Our current computer has one test1 user , After we prepare the users , You can start sending and receiving mail
Send E-mail
utilize Linux Next thunderbird The software sends and receives emails

We need login users , Click new message , The writing of the topic and the communicator of the message 、 Sending of corresponding message
thunderbird
test1
[email protected]
192.168.42.137 143
192.168.42.137 25

Click I have learned about the relevant risks > complete

We have successfully added a new email account here
This is the time , We can also add a new one in another way test Account
Account settings > Account operation > Add account >

Because we didn't add test Account , So the server connection failure will be displayed here
Now let's use the previously logged in test The user to test1 Users send email
New message > [email protected] > just a test > now we test a smtp send email

We don't save , We received an email in our inbox

After sending , We just receive emails
Receiving mail
Open the corresponding email directly , utilize thunderbird Receiving mail

边栏推荐
- Ad active directory and domain network
- Service address dynamic awareness of Nacos registry
- Why is the exclude or include attribute setting of the < keep alive > component invalid
- Turn: emotional internal friction is the biggest source of inefficiency in your life
- Pychart exits pytest mode (run pytest in mode)
- Six stones Management: the process is only convenient to shirk responsibility, but not helpful to solve problems
- Luo min cannot become Dong Yuhui
- Open sharing of scientific data in the context of open science: the practice of the national Qinghai Tibet Plateau scientific data center
- Fabric. JS centered element
- Shell judges whether the file exists and whether the file size is 0
猜你喜欢

Prosci anti-CD22 antibody epratuzum28 flow cytometry display

DotNetCore. Cap notes

Three modes of executing programs, memory and cache

Upgrade the leapfrog products again, and the 2023 Geely Xingrui will be sold from 113700 yuan
![[25. Hash table]](/img/c4/1500d070d44d3bd84eb141ed38013d.png)
[25. Hash table]

Chip sold at sand price: Lei Jun's dream was "ruined" by this company

Open source demo | release of open source example of arcall applet

Custom type

Actf questions (dropper+master_of_dns)

Redis learning notes (2) - power node of station B
随机推荐
Introduction to ORM framework - what is ORM framework?
[recognize cloud Nativity] Chapter 4 cloud network section 4.9.4.3 - smart network card usage scenario - network acceleration implementation
An article explains unsupervised learning in images in detail
How can arm access the Internet through a laptop?
Talk about resume optimization and interview skills of algorithm post!
2022.7.20 linear table
Inventory of well-known source code mall systems at home and abroad
Ad active directory and domain network
Musk responded whether he would upload his brain to the cloud: already did it!
Dynamic memory development
Mobile Robotics (3) Kalman filter
Create the first hbuilder project
Open source demo | release of open source example of arcall applet
Common functional interfaces_ Predicate interface_ Default method and and predicate interface exercise_ Set interface filtering
Three possible scenarios for SAP Spartacus server-side rendering
2022/7/18-7/19
Start to build a three node Eureka cluster
[C + + primer notes] Chapter 6 functions
ES6 modularization
Opengauss kernel analysis: query rewriting