If you are a system administrator you probably manage one or more email servers so things eventually will go wrong and need to be resolved as quickly as possible. It is beneficial to know how to troubleshoot email servers using telnet via a shell so you don’t have to rely on a GUI mail client. Below I describe how to login to an Exim email server using telnet, authenticate via SMTP authentication, and then send test emails. The below examples will be run from a terminal window on Linux however they should be very similar too running the commands from a Command Prompt on Windows 7 or any other operating systems using a terminal window or similar.
I recently was asked by some guys on my team if it was possible to get email notifications for every commit to svn with a description of what was removed, what was committed and a diff if possible. Now it seems like this would be easy and maybe even built into subversion so I checked into that first. There was a ruby script which can be made as a hook-script which is supposed to send email notifications. I spent quite some time trying to get it to work and didn’t have much luck so I decided to research some other options. I ran across a python program which was written specifically for this task called svnmailer.
Below I will detail the steps needed to get svnmailer working on your system:
Backtrack 4: Information Gathering: Searchengine: The Harvester – Email, User Names, Subdomain & Hostnames Finder
The next tool on Backtrack 4 I am going to review is The Harvester which was written by the guys over at Edge Security. The Harvester is a tool for gathering e-mail accounts, user names and hostnames/subdomains from different public sources. It’s a really simple tool, but very effective.
The supported sources are:
- Google – emails,subdomains/hostnames
- Bing search – emails, subdomains/hostnames
- Pgp servers – emails, subdomains/hostnames
- Linkedin – user names
Below I will go through a few examples of data mining some common search engines for usernames, email address’s and subdomains. The information gained in passive reconnaissance can be a invaluable resource for the penetration tester.