Rednote
GuidebooksTerminalCode
  • Welcome!
  • Utility
    • General
    • Server
    • Transferring File
      • Main
      • Code
      • Miscellaneous
    • Reverse & Bind Shells
      • Havoc
    • Metasploit
    • Service
      • FTP (21)
      • SSH (22)
      • DNS (53)
      • HTTP/HTTPS (80-443)
      • SMTP (25-465-587)
      • POP3 (110-995)
      • IMAP (143-993)
      • MySQL (3306)
      • MSSQL (1433-2433)
      • SMB (139-445)
      • RDP (3389)
      • WinRM (5985-5986)
      • WMI (135)
      • LLMNR & NBT-NS (5355-137)
      • NFS (111-2049)
      • SNMP (161-162)
      • VNC (5900)
      • Rsync (873)
      • R-Service (512-513-514)
      • IPMI (623)
      • Oracle TNS (1521)
  • Pentesting Process
    • Information Gathering
      • Passive
      • Active
      • OSINT
    • Vulnerability
    • Web Attacks
      • GENERAL
      • Crawling/Spidering & Fuzzing
      • Information Disclosure
      • Command Injection
      • Unrestricted File Upload
      • File Inclusion/Path Traversal
      • Request Smuggling
      • Clickjacking
      • Web Cache Poisoning
      • Web Cache Deception
      • Insecure Deserialization
      • Prototype Pollution
      • OAuth 2.0
      • JWT
      • SQLi
        • sqlmap
      • NoSQLi
      • GraphQL
      • XSS
      • SSRF
      • XXE
      • IDOR
      • API
      • SSTI
      • CSRF
      • CORS
      • AJP
      • SSI
      • ESI
      • XSLT
      • Cloud
      • LLM Prompt Security
    • Software Attacks
      • Binary
      • Shellcode
      • AV Evasion & Obfuscation
    • Network Attacks
      • ARP Poisoning
      • Local DNS Cache Poisoning
      • Baby Local DoS
    • Crypto Attacks
      • Utility
      • RSA
      • DSA/DSS
      • PRNG
        • LGC
        • MT
        • LFSR
    • Misc Attacks
    • Social Engineering
    • Password Cracking
      • Wordlist
      • Offline
      • Online
    • Pivoting & Tunneling
    • Local Enumeration
      • Linux
      • Windows
    • Privilege Escalation
      • Linux
        • Linux Privilege Escalation with Groups
        • Linux Privilege Escalation with Library
      • Windows
        • Windows Privilege Escalation with Groups and Privileges
        • Windows Privilege Escalation with DLL Hijacking
    • Active Directory
      • Enumeration
      • Abuse ACL
      • Extract Hash & Password
      • Pass The Hash
      • Pass The Ticket
      • Overpass the Hash
      • Relay Attack
      • Password Spraying Attack
      • AS-REP Roasting
      • Kerberoasting
      • Silver Ticket
      • Golden Ticket
      • DC Synchronization
      • AD Certificates
      • Attacking Domain Trusts
    • Reports
      • Bug Bounty Report
    • CVE
      • Linux
      • Windows
    • OTHER
      • CMS
        • WordPress
        • Joomla
        • Drupal
      • Tomcat
      • Jenkins
      • Splunk
      • Web Service
      • Navigating Python Objects
      • JavaScript Deobfuscation
  • Extra
    • My Books
    • My Exploits
    • Compiled Binaries
Powered by GitBook
On this page
  • Port
  • Interact

Was this helpful?

  1. Utility
  2. Service

IMAP (143-993)

Internet Message Access Protocol.

Protocol Information

IMAP is a protocol used to access email directly from the server, without having to download it. This allows users to synchronize their mail across multiple devices, so that any changes made on one, such as reading or deleting a message, are also visible on the others. IMAP is ideal for those who use multiple devices to manage their email, as all operations take place in real time on the server, keeping a copy of each email accessible from anywhere with an Internet connection. It also supports folder structures.

Port

143 TCP

IMAP (unencrypted)

993 TCP

IMAP (encrypted TLS/SSL)

Interact

nc <IP> 143
openssl s_client -connect <IP>:imaps
openssl s_client -connect <IP>:993 -crlf -quiet

Commands:

  1 LOGIN <USER> <PASS>    Login. User access
  1 LIST "" *              Lists all directories
  1 CREATE "INBOX"         Creates a mailbox with a specified name
  1 DELETE "INBOX"         Delete a mailbox
  1 RENAME "X" "Y"         Rename a mailbox.
  1 SEARCH ALL             To obtain a list of the message IDs in the folder
  1 LSUB "" *              Undo any changes
  1 SELECT INBOX           Select a mailbox so that you can access the messages in it
  1 UNSELECT INBOX         Exits the selected mailbox
  1 FETCH <ID/*> all       Retrieves data associated with a message in the mailbox
  1 FETCH <ID/*> BODY[]    //
  1 CLOSE                  Removes all messages with the Deleted flag set
  1 LOGOUT                 Closes the connection with the IMAP server

If an error indicating “bwrap: Can't create file at ...” is displayed when starting Evolution, use this command to start Evolution: export WEBKIT_FORCE_SANDBOX=0 && evolution

Last updated 8 months ago

Was this helpful?

Or .

Connect with Evolution