- Carnivore - Predator
- Formerly known as THC HackSuite, Carnivore - Predator stands at the forefront of cutting-edge cybersecurity tools, redefining the landscape of penetration testing with unparalleled innovation. Designed to empower ethical hackers, security professionals, and enthusiasts alike, Carnivore - Predator is the ultimate Pentest CMS that puts you in command.
current version: 0.7.0 - PREDATOR
This article explains how to effectively make use of AntiMail.
author: Remco Kouw
created: 27-Mar-2024
updated: 27-Mar-2024
AntiMail Introduction
This documentation explains the functionality of the THC AntiMail (thc_am) module.
AntiMail is a module designed to attack POP3 and IMAP mail servers using dictionary attacks.
Interface Parameters:
- Protocol: Selection menu containing the supported mail services.
- Mail Server: Location of the mail server.
- Username: Username of the user to be attacked.
- Port Number: TCP port where the service is listening.
- Select Wordlist: Selection menu that contains the names of wordlists from the Wordlists folder.
ModGlue Variables:
- $_CONTEXT['thc_am']['protocol']: (string) Selected mail protocol (e.g., 'POP3' or 'IMAP').
- $_CONTEXT['thc_am']['mailserver']: (string) Mail server address.
- $_CONTEXT['thc_am']['username']: (string) Username for the attack.
- $_CONTEXT['thc_am']['port']: (int) Port number where the service is listening.
- $_CONTEXT['thc_am']['wordlist']: (string) Path to the selected wordlist.
Resource Settings:
- Time Limit: PHP default.
- Memory Limit: PHP default.
Expanding AntiMail:
N/A
Dependencies:
CURL or Sockets (fallback)
Known Issues:
This is a dictionary attack brute-force module, which can demand significant memory resources. If you encounter time limit or memory issues, consider adjusting the module's settings.
Created by Remco Kouw: 2008-2024