Security Basics mailing list archives
Re: Re: mail server vulnerability
From: ryancol () ms com
Date: Tue, 10 Feb 2009 10:21:49 -0700
Umm... This is easy.... the $ indicates a bash prompt: $ telnet your.server.com 25 Trying 127.0.0.1... Connected to localhost. Escape character is '^]'. 220 foobar.com ESMTP Postfix 2.5.2 EHLO foobar.com 250-foobar.com 250-PIPELINING 250-SIZE 10240000 250-VRFY 250-ETRN 250-ENHANCEDSTATUSCODES 250-8BITMIME 250 DSN MAIL FROM: <foo () foobar com> 250 2.1.0 Ok RCPT TO: <somedude () gmail com> 250 2.1.5 Ok DATA: From: "Foo Dude" <foo () foobar com> To: "Some Dude" <somedude () gmail com> Subject: Test message This is test and more text then to send this message we will end it with just one blank line that has a . (dot) like below:
Current thread:
- mail server vulnerability Abhishek Kumar (Feb 09)
- Re: mail server vulnerability p3dRø (Feb 09)
- RE: mail server vulnerability Nick Vaernhoej (Feb 09)
- Re: mail server vulnerability Eitan Adler (Feb 10)
- <Possible follow-ups>
- Re: Re: mail server vulnerability viveksilla (Feb 10)
- Re: Re: mail server vulnerability ryancol (Feb 10)
- Re: mail server vulnerability Ansgar Wiechers (Feb 10)
- Re: Re: mail server vulnerability praveen_recker (Feb 20)
- Re: Re: mail server vulnerability Atilla Remote Support (Feb 20)
- Re: Re: mail server vulnerability greimer (Feb 20)
- Re: Re: mail server vulnerability Atilla Remote Support (Feb 20)
- Re: mail server vulnerability Patrick J Kobly (Feb 20)
- Re: mail server vulnerability Atilla Remote Support (Feb 20)
- Re: Re: mail server vulnerability Atilla Remote Support (Feb 20)
- Re: Re: mail server vulnerability Balakrishnan B (Feb 20)