• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint

Summary

In this chapter, you have seen how a misconfigured email server can take away the one piece of information that detects a spoofing attack: the header information. If an email server is vulnerable to a relay attack, the email really comes from the vulnerable server and doesn't require spoofing by the attacker.

Email attackers often hide behind innocent people to reduce their risk, and the innocents pay the price. For example, relay attacks can be used to direct spam through your email server, and attackers can locate email servers running on your network. You have also learned about Joe Job attacks, in which spam is sent with a victim's email address in the Reply-To header.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint