SMTP 메일 서버 텔넷, 넷캣으로 이메일 전송하기
2016. 12. 8. 12:13ㆍ보안 & 해킹/CTF
HELO tsuribori.test MAIL FROM: admin@gayluchat.org RCPT TO: keigo.yamazaki@tsuribori.test DATA From: Me<img src=0> To: You<img src=0> Date: Today<img src=0> Subject: Test Message<img src=0> This is a text message ! .
와 같은 형식으로 보낼 수 있음.
아래와 같은 규칙 형식..
What to do
The intial telnet: > symbolises your shell prompt.
The empty line between the headers and the body is important, as is the line containing only a full stop at the end of the article body.
telnet: > telnet mx1.example.com smtp telnet: Trying 192.0.2.2... telnet: Connected to mx1.example.com. telnet: Escape character is '^]'. server: 220 mx1.example.com ESMTP server ready Tue, 20 Jan 2004 22:33:36 +0200 client: HELO client.example.com server: 250 mx1.example.com client: MAIL from: <sender@example.com> server: 250 Sender <sender@example.com> Ok client: RCPT to: <recipient@example.com> server: 250 Recipient <recipient@example.com> Ok client: DATA server: 354 Ok Send data ending with <CRLF>.<CRLF> client: From: sender@example.com client: To: recipient@example.com client: Subject: Test message client: client: This is a test message. client: . server: 250 Message received: 20040120203404.CCCC18555.mx1.example.com@client.example.com client: QUIT server: 221 mx1.example.com ESMTP server closing connection
참고링크 : http://www.anta.net/misc/telnet-troubleshooting/smtp.shtml
'보안 & 해킹 > CTF' 카테고리의 다른 글
Steganography. 스테가노그래피 툴 받기 (0) | 2017.07.18 |
---|---|
Mr.Robot CTF 풀이3 (Walk through) (0) | 2017.03.29 |
Mr.Robot CTF 풀이2 (Walk through) (0) | 2017.03.29 |
Mr.Robot CTF 풀이1 (Walk through) (0) | 2017.03.29 |
Cipher 암호 디코더 (0) | 2016.12.07 |