• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 6. Unwilling Accomplices How Spammers Mask Their Identities Using Em...

Chapter 6. Unwilling Accomplices
How Spammers Mask Their Identities Using Email Relaying

IN THIS CHAPTER

In Chapter 5, “Would the Real Sender Please Stand Up?” you saw how attackers can easily spoof their email addresses and give the appearance that an email is from someone else. However, the email headers tell the true tale if you know where to look. In this chapter, you see how a misconfigured email server can take away the advantage of header information. If an email server is vulnerable to a relay attack, the email really comes from the vulnerable server and is not spoofed.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint