Usage of BrokenSMTP tool
Example 1: Use the BrokenSMTP tool to find all the Broken SMPTs on a single port.
python3 BrokenSMPT.py -t SMTPServer -p “port”
In this example, we will be finding all the Broken SMPTs on a single port. Here, we have given port number 25 as an input to the script.
The tool is checking for Email Spoofing Vulnerability on port number 25.
Example 2: Use the BrokenSMTP tool to find all the Broken SMPTs on all the ports.
python3 BrokenSMPT.py -t SMTPServer -p “*”
In the above example, we were finding the BrokenSMPT flaw on a single port, but in this example, we will be checking for vulnerability on all the ports. We have specified the “*” option which indicates to find the flaw in all the ports.
In the below screenshot, you can see that the tool is checking for vulnerability on every port which is been supported by the tool. This can help the attacker easily get the bug of Email SMPT spoofing on the target SMTP server.
BrokenSMTP – Python Script to look common vulnerabilities on SMTP server
SMTP (Simple Mail Transfer Protocol) is a protocol for email clients to move messages between servers, on the way to the end-users. What if the security is been breached in middle? All the messages will be leaked and there will be privacy issues which can lead to financial and personal losses for end-users. So to check if the SMTP server is been breached or not, there is an automated security tool called BrokenSMTP. BrokenSMTP tool is responsible for finding the vulnerabilities in the SMTP server. This tool is created in Python 3 language and has the support of the single port and also multiple ports in the same scan. We can also provide the list consisting of ports on which the tool will find the security flaw. So in this article, we will be installing the BrokenSMTP tool and also we will also try to find the vulnerability in different ports.