SlideShare a Scribd company logo
1 of 17
Download to read offline
Page 1 of 17 | What is so special about Spoof mail attack? |Part 3#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
What is so special about Spoof mail attack?
|Part 3#9
The special character of the spoofing attack is – that the “spoof action”, serves as a spearhead
for most of the other mail attacks.
In other words – the Spoof mail attack is accompanied by an additional type of mail attacks such
as Phishing mail attack or spam mail.
Spoof Mail Attack, What Is Good For?
The main purpose of the “spoof phase” is – to cause the destination recipient to trust the sender
identity.
Page 2 of 17 | What is so special about Spoof mail attack? |Part 3#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
The “trust,” is the first building block in the “mail attack building.”
After the hostile element manage to build the bridge of “trust” between him and his victim,
there is a high chance that the next step in the attack will successfully complete.
The Spoof E-mail attack does not exist by itself, but instead, serve as the first phase (the trust
phase) that leads to the next phase in which the hostile element asks from his victim to do
something.
For example
Case 1 – E-mail message + malware
The hostile element presents himself as a trustworthy sender and asks from the destination
recipient to open the attachment (the malware) in the E-mail message.
Case 2 – Spam mail
The hostile element presents himself as a trustworthy sender and asks from the destination
recipient to purchase a specific product or specific service.
Page 3 of 17 | What is so special about Spoof mail attack? |Part 3#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
Case 3 – Phishing mail attacks
The hostile element presents himself as a trustworthy sender and asks from the destination
recipient to “do something” such as – reset his password, access a specific website, deposit
money to a specific bank account and so on.
What Is The Meaning Of Spoofing, Spoof E-Mail, Spoof Attack And All The
Rest?
The simple explanation for the term “spoofing” is, a scenario in which entity A is masking his
true identity, and present another identity such as the identity of entity B.
The main purpose of the element that uses the option of spoofing his identity is to “buy the
trust” of his victim by using an identity that the victim can trust.
The “spoofed identity” can be an identity of a sender who “belong” to a well-known
organization or in some cases, the attacker provides the identity of a sender whom the
destination recipient knows such as someone from his organization.
Page 4 of 17 | What is so special about Spoof mail attack? |Part 3#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
The purpose of Spoof mail attack
As mentioned, the purpose of the “spoof mechanism” is to serve as the tool by hostel element
for – “opening the gate” of the victim fortress.
In case that the attacker manages to bypass the “trust obstacle,” the attacker executes the rest
of attack steps such as – social engineering, Phishing website, malware and so on.
Page 5 of 17 | What is so special about Spoof mail attack? |Part 3#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
Exploiting The “Victim Trust”
The type of identities that can be used by the hostile element.
1. The identity of a sender of a famous or well-known company that has a good reputation.
For example, the identity of a recipient from a well-known company such as PayPal or a famous
bank.
2. The identity of a sender of the same organization of the victim.
This is the classic scenario of the CFO and CIO, the scenario of “manager and assists,” the
scenario of people from the Helpdesk that address an organization’s user and so on.
In this type of scenario, the attacker abuses the natural tendency of people to trust someone
from their organization, and especially if this person (the spoofed identity that used by the
attacker) considers as VIP, manager or identity with power or authority.
3. Anonymous identity
Less professional attackers, could use an E-mail account (E-mail message) that was created on
the major mail, provide such as – Gmail, Hotmail, Yahoo and so on. In this case, the “trust factor”
is reduced because the destination recipient is not tempted to believe that the sender is a
“known sender”.
A common two misconceptions about Spoof E-mail attack
Page 6 of 17 | What is so special about Spoof mail attack? |Part 3#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
In this section, I would like to talk about two misconceptions that most of us have regarding the
subject of Spoof E-mail attack.
Misconception 1#2 – Spoof E-mail are executed by a professional hacker.
The most common misconception about Spoof E-mail attack is, that executing Spoof E-mail
attack can be implemented only by a professional or, by a super doper cyber-criminal!
Most of us have an image in our head of a guy with thick glasses, sitting in a dark room full will
computer screen, print in rage strange computer language commands, trying to attack our
systems.
The truth is much simpler, in nowadays, the ability to send anonymous E-mail or to spoof the
identity of the sender is very simple and easy.
No need to be a super cyber-criminal!
Page 7 of 17 | What is so special about Spoof mail attack? |Part 3#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
The option of sending Spoof E-mail is very simple, and if we want to make even simpler, there
are many online web-based tools that can help us to accomplish this task.
In the following screenshot, we can see an example of the search result for the search string
“send mail anonymous tool”.
As we can see, there are 28,000,000 results for this specific search term.
You are most welcome to try out yourself to realize, how easy and simple is the process is
spoofing your E-mail address identity.
Note – if you want to read more information about the way of simulating Spoof E-mail attack,
you can read the article – How to Simulate E-mail Spoof Attack |Part 11#12
Page 8 of 17 | What is so special about Spoof mail attack? |Part 3#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
Misconception 2#2 – my mail server “know” how to identify and block Spoof E-
mail.
The simple true on the assumption in which our mail infrastructure includes a protection
mechanism that will protect us from Spoof E-mail attack, most of the time this assumption is
wrong!
In other words, most of the existing mail infrastructures don’t deal so not handling well or not
handling at all scenarios of Spoof E-mail and Phishing mail attacks.
Spoof E-mail is not a virus and not a spam mail!
Most of the mail infrastructure include some kind of anti-virus protection and some kind of anti-
spam filter, and this protestation mechanism provides pretty good protection.
Page 9 of 17 | What is so special about Spoof mail attack? |Part 3#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
The strange answer to the declaration of the fact that most of the mail infrastructure are not
handling well scenario of Spoof E-mail is because an Inherent weakness of the SMTP mail
protocol.
The SMTP protocol can be described as a “naive protocol” or “innocent protocol” because the
SMTP protocol was not created with an awareness of a scenario in which hostile elements will try
to spoof their identity.
The main goal of the people who created the SMTP protocol was to enable the delivery of
E-mail message from point A to point B quickly and efficiently.
The mail server that represents the sender addresses the mail server that represents the
destination recipient and asks him to deliver the E-mail message to the specific recipients.
Very easy and very straight forward.
The mail server that represents the destination recipient (the receiving mail server) was not
configured to suspect or, to doubt the information about the sender identity.
If the senders claim that his identity is X, as long as the E-mail address format is correct, the
destination mail server will “believe” the information about the sender identity.
Let’s assume that we have improved the awareness of the destination mail server to the fact that
some of the senders could be hostile elements.
How can we verify the sender identity, so we will be able to trust him?
Page 10 of 17 | What is so special about Spoof mail attack? |Part 3#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
The good news that in nowadays, we have a couple of mail sender authentication standards
such as SPF, DKIM and DMARC, that can help is to verify the sender identity.
The less good news is that the implementation of this protocol is not so simple because of many
reasons that we will review later in the article – The questions that we will need to answer before
we start the project of – building a defense system that will protect us from Spoof mail attacks |
Part 7#9
The Two Major Flavors Of Spoof E-Mail Attacks
A very important subject that I would like to emphasize is that when we use the term – “Spoof E-
mail attack,” the term can be translated into two major scenarios:
Scenario 1 – Spoof mail attack that is directed towards “other users” (not our users) but the
attacker uses our organizational identity when performing the Spoof mail attack.
Scenario 2 – Spoof mail attack in which the attack is directed towards our users.
The attacker can use a false sender E-mail address which includes our domain name or use an
“external E-mail address” (an E-mail address that includes other domain names that represent
other organizations with a good reputation that considers as trusted organization.
The common association that appears in our mind regarding the Spoof mail attack is related to
“scenario 2” in which our users become the victim of Spoof mail attack.
Although this type of attack is more “viable” and more tangible, it’s important to emphasize that
the other scenario, in which hostile is Stealing our organizational identity and abuse it by
Page 11 of 17 | What is so special about Spoof mail attack? |Part 3#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
attacking another organization is also a “problematic scenario” which could lead to unwanted
results that can harm our organization’s reputation.
Scenario 1 – Spoof mail attack that is directed towards “other users” (not our
users).
A scenario in which the attacker is “stealing” our organization identity.
For example, our organization domain name is – o365info.com
A hostile element, present himself by using a sender E-mail address, that includes our domain
name such as – ceo@o365info.com
The reason that the attacker chooses to use our domain is – probably because our organization
is considered as an organization with a good reputation that can be trusted.
In this case, the main purpose of the attacker is – persuade the victim (the recipients from the
other organization) “believe him” because his identity (his E-mail address that uses our domain
name) can be trusted.
In this case, the hostile element is using “our organization good reputation” for abusing
recipient from other organizations.
Page 12 of 17 | What is so special about Spoof mail attack? |Part 3#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
Scenario 2 – Spoof mail attack in which the attack is directed towards our users.
A scenario in which the hostile element attacks our organization recipients by presenting false
sender identity.
The false sender identity which the attacker is using can be implemented in two ways:
Scenario 2.1 – the attacker attacks our organization, using a “well know” E-mail address.
In this scenario, the attacker uses a false identity that is based on email messages that include a
domain name of a company that is well known or, considered as trusted organization.
Page 13 of 17 | What is so special about Spoof mail attack? |Part 3#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
Scenario 2.2 – the attacker attacks our organization, using an E-mail address that includes our
domain name.
This type of scenario is the most “painful” scenario because, in this case, the attacker Disguises
himself using the identity of a person from the same organization as the person that he attacks
(the victim).
An example to such as scenario could be a spear phishing, a specific type of Phishing mail
attack, in which the attacker uses an identity of a “well know” person from our organization such
as the E-mail address of the company CFO.
The attacker uses this identity for attacking Key People in the organization.
Because the victim sees a familiar sender’s identity, he is easily tempted to trust the “sender E-
mail”.
Page 14 of 17 | What is so special about Spoof mail attack? |Part 3#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
Note – technically speaking, regarding the scenario in which the Phishing mail attack is pointed
toward our organization users, there could be an additional variation on this scenario in which
the hostile element does not bother to “cover his real identity” using a “good fake identity” and
instead, uses a general identity or public mail provider such as Yahoo, Hotmail, Gmail, etc.
Spoof E-Mail Attacks | What Are The Possible Damages?
Let’s briefly review the most obvious damages in the case that the attacker manages to execute
his Spoof E-mail attack.
As mentioned before, in reality, that hostile element is not satisfied with Spoof E-mail attack
because he cannot gain anything by succeeding the complete this type of attack.
The attacker uses the Spoof E-mail attack as an “appetizer” for the “main course.” course”.
The optional damage in case that the hostile element manages to complete the attack (such as
Spoof E-mail attacks and Phishing E-mail attacks) is the damage that will be realized from the
specific attack that was executed.
Page 15 of 17 | What is so special about Spoof mail attack? |Part 3#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
For example – in as scenario of an E-mail message that includes a malware, the damage that we
will experience, depend on the malicious activity that the malware was programmed to do.
Another question that can appear in our mind could be – is this is the only damage that can
happen? Is there a possibility for additional and further damages?
The damages of the “attack” could be a minor damage but on the other side, can cause a huge
damage.
For example, let’s assume that the attacker executes Phishing E-mail attacks (that include a
Spoof E-mail attack) in which he persuaded the company CEO to transfer to his bank account
the amount of money worth 500, 000$.$.
What could be the damage of this attack beside of the financial loss?
The damage could be a “CEO rage attack,” which can lead to a scenario in which we need to
update our CV because we need to look for a new job (the politically-correct term is – looking
for a new challenge).
Page 16 of 17 | What is so special about Spoof mail attack? |Part 3#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
A scenario in which the attacker uses our organizational identity for attacking other
victims.
Now, let’s talk about the possible damages in a scenario, in which the hostile element uses our
organization identity and attacks another organization.
Let’s assume that the attacker manages to complete the attack, and let’s assume that we don’t
care what is the damage caused by another organization.
So what do we care if a hostile element uses our organizational identity?
The answer is that we should care!
The fact that the attack was executed using “our identity” is very bad for our reputation.
In many scenarios, the “other organization” that was the victim of the Spoof E-mail attack, will
reward us be reporting this information to blacklist providers.
The process in which our domain name is registered in the email blacklist is quite simple
(because there is real evidence for the fact that our organization “attack” other organizations).
The process of “delist,” in which we recognize that our domain name appears in a well know
blacklists, and we ask to remove our name from this “respectable list”, is not so simple and in
many cases, could be a long exhausting process.
Page 17 of 17 | What is so special about Spoof mail attack? |Part 3#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
Meanwhile, while our domain name appears on a blacklist, the outcome could be that many of
the outgoing E-mail messages that sent by organization users to external recipients, will be
blocked or rejected by the destination mail infrastructure because our domain name appears as
a problematic domain.
Additional reading
Video lecture
 How To Avoid Falling Prey To Phishing Scams
The next article in the current article series is
What is the meaning of mail Phishing attack in simple words? | Part 4#9

More Related Content

What's hot

An intellect learning on e mail
An intellect learning on e mailAn intellect learning on e mail
An intellect learning on e mailIJNSA Journal
 
Low Cost Page Quality Factors To Detect Web Spam
Low Cost Page Quality Factors To Detect Web Spam Low Cost Page Quality Factors To Detect Web Spam
Low Cost Page Quality Factors To Detect Web Spam ieijjournal
 
Fire eye spearphishing
Fire eye spearphishingFire eye spearphishing
Fire eye spearphishingZeno Idzerda
 
A Survey Paper on Identity Theft in the Internet
A Survey Paper on Identity Theft in the InternetA Survey Paper on Identity Theft in the Internet
A Survey Paper on Identity Theft in the Internetijtsrd
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Securityanjuselina
 
Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer JungleJason S
 
What is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | EdurekaWhat is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | EdurekaEdureka!
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldAvishek Datta
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharksNalneesh Gaur
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORTvineetkathan
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacksSreejith.D. Menon
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crackKlaus Drosch
 
Beginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdfBeginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdfIndianArmy38
 

What's hot (19)

An intellect learning on e mail
An intellect learning on e mailAn intellect learning on e mail
An intellect learning on e mail
 
Low Cost Page Quality Factors To Detect Web Spam
Low Cost Page Quality Factors To Detect Web Spam Low Cost Page Quality Factors To Detect Web Spam
Low Cost Page Quality Factors To Detect Web Spam
 
Webspoofing
WebspoofingWebspoofing
Webspoofing
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Phishing
PhishingPhishing
Phishing
 
Fire eye spearphishing
Fire eye spearphishingFire eye spearphishing
Fire eye spearphishing
 
A Survey Paper on Identity Theft in the Internet
A Survey Paper on Identity Theft in the InternetA Survey Paper on Identity Theft in the Internet
A Survey Paper on Identity Theft in the Internet
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 
Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer Jungle
 
What is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | EdurekaWhat is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | Edureka
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
Phishing
PhishingPhishing
Phishing
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
 
Shiv seminar final
Shiv seminar finalShiv seminar final
Shiv seminar final
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crack
 
Beginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdfBeginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdf
 

Viewers also liked

Guides ghilles boatman
Guides ghilles boatmanGuides ghilles boatman
Guides ghilles boatmanMark Corps
 
AED-SICAD AG
AED-SICAD AGAED-SICAD AG
AED-SICAD AGsmespire
 
Implementing INSPIRE services for Dutch provinces
Implementing INSPIRE services for Dutch provincesImplementing INSPIRE services for Dutch provinces
Implementing INSPIRE services for Dutch provincessmespire
 
Real estate craig feigin
Real estate  craig feiginReal estate  craig feigin
Real estate craig feiginCraig Feigin
 
20130410 het abc van sociale media kalken
20130410 het abc van sociale media kalken20130410 het abc van sociale media kalken
20130410 het abc van sociale media kalkenkwb_eensgezind
 
Manual para-realizar-estudios-de-prefactibilidad-y-factibilidad
Manual para-realizar-estudios-de-prefactibilidad-y-factibilidadManual para-realizar-estudios-de-prefactibilidad-y-factibilidad
Manual para-realizar-estudios-de-prefactibilidad-y-factibilidadAlicia Quispe
 
Final outcome Ukraine
Final outcome UkraineFinal outcome Ukraine
Final outcome UkraineHalyna Kasyan
 
Quaker Process and Decision Making
Quaker Process and Decision MakingQuaker Process and Decision Making
Quaker Process and Decision Makinghhutchison
 
BEST HARDWARE AND NETWORKING TRAINING
BEST HARDWARE AND NETWORKING TRAININGBEST HARDWARE AND NETWORKING TRAINING
BEST HARDWARE AND NETWORKING TRAININGCMS Computer
 
Leveraging SMEs’ Strength for INSPIRE
Leveraging SMEs’ Strength for INSPIRELeveraging SMEs’ Strength for INSPIRE
Leveraging SMEs’ Strength for INSPIREsmespire
 
Nätverk och internet
Nätverk och internetNätverk och internet
Nätverk och internetpakman123
 
Evolution of an open Spatial Data Infrastructure in time (and how we deal wit...
Evolution of an open Spatial Data Infrastructure in time (and how we deal wit...Evolution of an open Spatial Data Infrastructure in time (and how we deal wit...
Evolution of an open Spatial Data Infrastructure in time (and how we deal wit...smespire
 
Pdhpe ratioanle
Pdhpe ratioanlePdhpe ratioanle
Pdhpe ratioanleJen_e1986
 
Active sentences
Active sentencesActive sentences
Active sentencesMiz Endang
 
Ricerca sui fregi
Ricerca sui fregiRicerca sui fregi
Ricerca sui fregichristian98
 
LEVICK Weekly - Jan 25 2013
LEVICK Weekly - Jan 25 2013LEVICK Weekly - Jan 25 2013
LEVICK Weekly - Jan 25 2013LEVICK
 
LR новогодний каталог2012 часть4
LR новогодний каталог2012 часть4LR новогодний каталог2012 часть4
LR новогодний каталог2012 часть4t575ae
 

Viewers also liked (20)

Guides ghilles boatman
Guides ghilles boatmanGuides ghilles boatman
Guides ghilles boatman
 
AED-SICAD AG
AED-SICAD AGAED-SICAD AG
AED-SICAD AG
 
Implementing INSPIRE services for Dutch provinces
Implementing INSPIRE services for Dutch provincesImplementing INSPIRE services for Dutch provinces
Implementing INSPIRE services for Dutch provinces
 
Real estate craig feigin
Real estate  craig feiginReal estate  craig feigin
Real estate craig feigin
 
20130410 het abc van sociale media kalken
20130410 het abc van sociale media kalken20130410 het abc van sociale media kalken
20130410 het abc van sociale media kalken
 
Il condizionale
Il condizionaleIl condizionale
Il condizionale
 
Oep
OepOep
Oep
 
Imperativo lei
Imperativo leiImperativo lei
Imperativo lei
 
Manual para-realizar-estudios-de-prefactibilidad-y-factibilidad
Manual para-realizar-estudios-de-prefactibilidad-y-factibilidadManual para-realizar-estudios-de-prefactibilidad-y-factibilidad
Manual para-realizar-estudios-de-prefactibilidad-y-factibilidad
 
Final outcome Ukraine
Final outcome UkraineFinal outcome Ukraine
Final outcome Ukraine
 
Quaker Process and Decision Making
Quaker Process and Decision MakingQuaker Process and Decision Making
Quaker Process and Decision Making
 
BEST HARDWARE AND NETWORKING TRAINING
BEST HARDWARE AND NETWORKING TRAININGBEST HARDWARE AND NETWORKING TRAINING
BEST HARDWARE AND NETWORKING TRAINING
 
Leveraging SMEs’ Strength for INSPIRE
Leveraging SMEs’ Strength for INSPIRELeveraging SMEs’ Strength for INSPIRE
Leveraging SMEs’ Strength for INSPIRE
 
Nätverk och internet
Nätverk och internetNätverk och internet
Nätverk och internet
 
Evolution of an open Spatial Data Infrastructure in time (and how we deal wit...
Evolution of an open Spatial Data Infrastructure in time (and how we deal wit...Evolution of an open Spatial Data Infrastructure in time (and how we deal wit...
Evolution of an open Spatial Data Infrastructure in time (and how we deal wit...
 
Pdhpe ratioanle
Pdhpe ratioanlePdhpe ratioanle
Pdhpe ratioanle
 
Active sentences
Active sentencesActive sentences
Active sentences
 
Ricerca sui fregi
Ricerca sui fregiRicerca sui fregi
Ricerca sui fregi
 
LEVICK Weekly - Jan 25 2013
LEVICK Weekly - Jan 25 2013LEVICK Weekly - Jan 25 2013
LEVICK Weekly - Jan 25 2013
 
LR новогодний каталог2012 часть4
LR новогодний каталог2012 часть4LR новогодний каталог2012 часть4
LR новогодний каталог2012 часть4
 

Similar to What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com

What is SPF record good for? | Part 7#17
What is SPF record good for? | Part 7#17What is SPF record good for? | Part 7#17
What is SPF record good for? | Part 7#17Eyal Doron
 
Spoofing
SpoofingSpoofing
SpoofingSanjeev
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptxTanvir Amin
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Okan YILDIZ
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitssuser64f8f8
 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigationNimishaRawat
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteRapidSSLOnline.com
 
Security awareness
Security awarenessSecurity awareness
Security awarenessSanoop Nair
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresIRJET Journal
 
Web spoofing hacking
Web spoofing hackingWeb spoofing hacking
Web spoofing hackingjignesh khunt
 
[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...Liberteks
 
Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptxAbdulHaseebKhan34
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofingMattChapman50
 

Similar to What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com (20)

What is SPF record good for? | Part 7#17
What is SPF record good for? | Part 7#17What is SPF record good for? | Part 7#17
What is SPF record good for? | Part 7#17
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Spoofing
SpoofingSpoofing
Spoofing
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
 
internet security
internet securityinternet security
internet security
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigation
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
Web spoofing hacking
Web spoofing hackingWeb spoofing hacking
Web spoofing hacking
 
Phishing mails: Bonnes pratiques
Phishing mails: Bonnes pratiques Phishing mails: Bonnes pratiques
Phishing mails: Bonnes pratiques
 
[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...
 
Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptx
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofing
 
Safe Email Practices
Safe Email PracticesSafe Email Practices
Safe Email Practices
 
Social Engineering CSO Survival Guide
Social Engineering CSO Survival GuideSocial Engineering CSO Survival Guide
Social Engineering CSO Survival Guide
 

More from Eyal Doron

How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2Eyal Doron
 
How does sender verification work how we identify spoof mail) spf, dkim dmar...
How does sender verification work  how we identify spoof mail) spf, dkim dmar...How does sender verification work  how we identify spoof mail) spf, dkim dmar...
How does sender verification work how we identify spoof mail) spf, dkim dmar...Eyal Doron
 
Dealing with a spoof mail attacks and phishing mail attacks a little story ...
Dealing with a spoof mail attacks and phishing mail attacks   a little story ...Dealing with a spoof mail attacks and phishing mail attacks   a little story ...
Dealing with a spoof mail attacks and phishing mail attacks a little story ...Eyal Doron
 
Exchange In-Place eDiscovery & Hold | Introduction | 5#7
Exchange In-Place eDiscovery & Hold | Introduction  | 5#7Exchange In-Place eDiscovery & Hold | Introduction  | 5#7
Exchange In-Place eDiscovery & Hold | Introduction | 5#7Eyal Doron
 
Mail migration to office 365 measure and estimate mail migration throughput...
Mail migration to office 365   measure and estimate mail migration throughput...Mail migration to office 365   measure and estimate mail migration throughput...
Mail migration to office 365 measure and estimate mail migration throughput...Eyal Doron
 
Mail migration to office 365 factors that impact mail migration performance...
Mail migration to office 365   factors that impact mail migration performance...Mail migration to office 365   factors that impact mail migration performance...
Mail migration to office 365 factors that impact mail migration performance...Eyal Doron
 
Mail migration to office 365 optimizing the mail migration throughput - par...
Mail migration to office 365   optimizing the mail migration throughput - par...Mail migration to office 365   optimizing the mail migration throughput - par...
Mail migration to office 365 optimizing the mail migration throughput - par...Eyal Doron
 
Mail migration to office 365 mail migration methods - part 1#4
Mail migration to office 365   mail migration methods - part 1#4Mail migration to office 365   mail migration methods - part 1#4
Mail migration to office 365 mail migration methods - part 1#4Eyal Doron
 
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4Eyal Doron
 
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36
Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36Eyal Doron
 
Autodiscover flow in an office 365 environment part 3#3 part 31#36
Autodiscover flow in an office 365 environment  part 3#3  part 31#36Autodiscover flow in an office 365 environment  part 3#3  part 31#36
Autodiscover flow in an office 365 environment part 3#3 part 31#36Eyal Doron
 
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36
Autodiscover flow in an exchange hybrid environment  part 1#3  part 32#36Autodiscover flow in an exchange hybrid environment  part 1#3  part 32#36
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36Eyal Doron
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...Eyal Doron
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...Eyal Doron
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...Eyal Doron
 
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...
Outlook test e mail auto configuration autodiscover troubleshooting tools p...Eyal Doron
 
Microsoft remote connectivity analyzer (exrca) autodiscover troubleshooting ...
Microsoft remote connectivity analyzer (exrca)  autodiscover troubleshooting ...Microsoft remote connectivity analyzer (exrca)  autodiscover troubleshooting ...
Microsoft remote connectivity analyzer (exrca) autodiscover troubleshooting ...Eyal Doron
 
Microsoft connectivity analyzer (mca) autodiscover troubleshooting tools pa...
Microsoft connectivity analyzer (mca)  autodiscover troubleshooting tools  pa...Microsoft connectivity analyzer (mca)  autodiscover troubleshooting tools  pa...
Microsoft connectivity analyzer (mca) autodiscover troubleshooting tools pa...Eyal Doron
 
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...
Outlook test e mail auto configuration autodiscover troubleshooting tools p...Eyal Doron
 
Microsoft remote connectivity analyzer (ex rca) autodiscover troubleshooting...
Microsoft remote connectivity analyzer (ex rca)  autodiscover troubleshooting...Microsoft remote connectivity analyzer (ex rca)  autodiscover troubleshooting...
Microsoft remote connectivity analyzer (ex rca) autodiscover troubleshooting...Eyal Doron
 

More from Eyal Doron (20)

How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2
 
How does sender verification work how we identify spoof mail) spf, dkim dmar...
How does sender verification work  how we identify spoof mail) spf, dkim dmar...How does sender verification work  how we identify spoof mail) spf, dkim dmar...
How does sender verification work how we identify spoof mail) spf, dkim dmar...
 
Dealing with a spoof mail attacks and phishing mail attacks a little story ...
Dealing with a spoof mail attacks and phishing mail attacks   a little story ...Dealing with a spoof mail attacks and phishing mail attacks   a little story ...
Dealing with a spoof mail attacks and phishing mail attacks a little story ...
 
Exchange In-Place eDiscovery & Hold | Introduction | 5#7
Exchange In-Place eDiscovery & Hold | Introduction  | 5#7Exchange In-Place eDiscovery & Hold | Introduction  | 5#7
Exchange In-Place eDiscovery & Hold | Introduction | 5#7
 
Mail migration to office 365 measure and estimate mail migration throughput...
Mail migration to office 365   measure and estimate mail migration throughput...Mail migration to office 365   measure and estimate mail migration throughput...
Mail migration to office 365 measure and estimate mail migration throughput...
 
Mail migration to office 365 factors that impact mail migration performance...
Mail migration to office 365   factors that impact mail migration performance...Mail migration to office 365   factors that impact mail migration performance...
Mail migration to office 365 factors that impact mail migration performance...
 
Mail migration to office 365 optimizing the mail migration throughput - par...
Mail migration to office 365   optimizing the mail migration throughput - par...Mail migration to office 365   optimizing the mail migration throughput - par...
Mail migration to office 365 optimizing the mail migration throughput - par...
 
Mail migration to office 365 mail migration methods - part 1#4
Mail migration to office 365   mail migration methods - part 1#4Mail migration to office 365   mail migration methods - part 1#4
Mail migration to office 365 mail migration methods - part 1#4
 
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4
 
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36
Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36
 
Autodiscover flow in an office 365 environment part 3#3 part 31#36
Autodiscover flow in an office 365 environment  part 3#3  part 31#36Autodiscover flow in an office 365 environment  part 3#3  part 31#36
Autodiscover flow in an office 365 environment part 3#3 part 31#36
 
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36
Autodiscover flow in an exchange hybrid environment  part 1#3  part 32#36Autodiscover flow in an exchange hybrid environment  part 1#3  part 32#36
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
 
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
 
Microsoft remote connectivity analyzer (exrca) autodiscover troubleshooting ...
Microsoft remote connectivity analyzer (exrca)  autodiscover troubleshooting ...Microsoft remote connectivity analyzer (exrca)  autodiscover troubleshooting ...
Microsoft remote connectivity analyzer (exrca) autodiscover troubleshooting ...
 
Microsoft connectivity analyzer (mca) autodiscover troubleshooting tools pa...
Microsoft connectivity analyzer (mca)  autodiscover troubleshooting tools  pa...Microsoft connectivity analyzer (mca)  autodiscover troubleshooting tools  pa...
Microsoft connectivity analyzer (mca) autodiscover troubleshooting tools pa...
 
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
 
Microsoft remote connectivity analyzer (ex rca) autodiscover troubleshooting...
Microsoft remote connectivity analyzer (ex rca)  autodiscover troubleshooting...Microsoft remote connectivity analyzer (ex rca)  autodiscover troubleshooting...
Microsoft remote connectivity analyzer (ex rca) autodiscover troubleshooting...
 

Recently uploaded

Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 

Recently uploaded (20)

Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 

What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com

  • 1. Page 1 of 17 | What is so special about Spoof mail attack? |Part 3#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 What is so special about Spoof mail attack? |Part 3#9 The special character of the spoofing attack is – that the “spoof action”, serves as a spearhead for most of the other mail attacks. In other words – the Spoof mail attack is accompanied by an additional type of mail attacks such as Phishing mail attack or spam mail. Spoof Mail Attack, What Is Good For? The main purpose of the “spoof phase” is – to cause the destination recipient to trust the sender identity.
  • 2. Page 2 of 17 | What is so special about Spoof mail attack? |Part 3#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 The “trust,” is the first building block in the “mail attack building.” After the hostile element manage to build the bridge of “trust” between him and his victim, there is a high chance that the next step in the attack will successfully complete. The Spoof E-mail attack does not exist by itself, but instead, serve as the first phase (the trust phase) that leads to the next phase in which the hostile element asks from his victim to do something. For example Case 1 – E-mail message + malware The hostile element presents himself as a trustworthy sender and asks from the destination recipient to open the attachment (the malware) in the E-mail message. Case 2 – Spam mail The hostile element presents himself as a trustworthy sender and asks from the destination recipient to purchase a specific product or specific service.
  • 3. Page 3 of 17 | What is so special about Spoof mail attack? |Part 3#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 Case 3 – Phishing mail attacks The hostile element presents himself as a trustworthy sender and asks from the destination recipient to “do something” such as – reset his password, access a specific website, deposit money to a specific bank account and so on. What Is The Meaning Of Spoofing, Spoof E-Mail, Spoof Attack And All The Rest? The simple explanation for the term “spoofing” is, a scenario in which entity A is masking his true identity, and present another identity such as the identity of entity B. The main purpose of the element that uses the option of spoofing his identity is to “buy the trust” of his victim by using an identity that the victim can trust. The “spoofed identity” can be an identity of a sender who “belong” to a well-known organization or in some cases, the attacker provides the identity of a sender whom the destination recipient knows such as someone from his organization.
  • 4. Page 4 of 17 | What is so special about Spoof mail attack? |Part 3#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 The purpose of Spoof mail attack As mentioned, the purpose of the “spoof mechanism” is to serve as the tool by hostel element for – “opening the gate” of the victim fortress. In case that the attacker manages to bypass the “trust obstacle,” the attacker executes the rest of attack steps such as – social engineering, Phishing website, malware and so on.
  • 5. Page 5 of 17 | What is so special about Spoof mail attack? |Part 3#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 Exploiting The “Victim Trust” The type of identities that can be used by the hostile element. 1. The identity of a sender of a famous or well-known company that has a good reputation. For example, the identity of a recipient from a well-known company such as PayPal or a famous bank. 2. The identity of a sender of the same organization of the victim. This is the classic scenario of the CFO and CIO, the scenario of “manager and assists,” the scenario of people from the Helpdesk that address an organization’s user and so on. In this type of scenario, the attacker abuses the natural tendency of people to trust someone from their organization, and especially if this person (the spoofed identity that used by the attacker) considers as VIP, manager or identity with power or authority. 3. Anonymous identity Less professional attackers, could use an E-mail account (E-mail message) that was created on the major mail, provide such as – Gmail, Hotmail, Yahoo and so on. In this case, the “trust factor” is reduced because the destination recipient is not tempted to believe that the sender is a “known sender”. A common two misconceptions about Spoof E-mail attack
  • 6. Page 6 of 17 | What is so special about Spoof mail attack? |Part 3#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 In this section, I would like to talk about two misconceptions that most of us have regarding the subject of Spoof E-mail attack. Misconception 1#2 – Spoof E-mail are executed by a professional hacker. The most common misconception about Spoof E-mail attack is, that executing Spoof E-mail attack can be implemented only by a professional or, by a super doper cyber-criminal! Most of us have an image in our head of a guy with thick glasses, sitting in a dark room full will computer screen, print in rage strange computer language commands, trying to attack our systems. The truth is much simpler, in nowadays, the ability to send anonymous E-mail or to spoof the identity of the sender is very simple and easy. No need to be a super cyber-criminal!
  • 7. Page 7 of 17 | What is so special about Spoof mail attack? |Part 3#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 The option of sending Spoof E-mail is very simple, and if we want to make even simpler, there are many online web-based tools that can help us to accomplish this task. In the following screenshot, we can see an example of the search result for the search string “send mail anonymous tool”. As we can see, there are 28,000,000 results for this specific search term. You are most welcome to try out yourself to realize, how easy and simple is the process is spoofing your E-mail address identity. Note – if you want to read more information about the way of simulating Spoof E-mail attack, you can read the article – How to Simulate E-mail Spoof Attack |Part 11#12
  • 8. Page 8 of 17 | What is so special about Spoof mail attack? |Part 3#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 Misconception 2#2 – my mail server “know” how to identify and block Spoof E- mail. The simple true on the assumption in which our mail infrastructure includes a protection mechanism that will protect us from Spoof E-mail attack, most of the time this assumption is wrong! In other words, most of the existing mail infrastructures don’t deal so not handling well or not handling at all scenarios of Spoof E-mail and Phishing mail attacks. Spoof E-mail is not a virus and not a spam mail! Most of the mail infrastructure include some kind of anti-virus protection and some kind of anti- spam filter, and this protestation mechanism provides pretty good protection.
  • 9. Page 9 of 17 | What is so special about Spoof mail attack? |Part 3#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 The strange answer to the declaration of the fact that most of the mail infrastructure are not handling well scenario of Spoof E-mail is because an Inherent weakness of the SMTP mail protocol. The SMTP protocol can be described as a “naive protocol” or “innocent protocol” because the SMTP protocol was not created with an awareness of a scenario in which hostile elements will try to spoof their identity. The main goal of the people who created the SMTP protocol was to enable the delivery of E-mail message from point A to point B quickly and efficiently. The mail server that represents the sender addresses the mail server that represents the destination recipient and asks him to deliver the E-mail message to the specific recipients. Very easy and very straight forward. The mail server that represents the destination recipient (the receiving mail server) was not configured to suspect or, to doubt the information about the sender identity. If the senders claim that his identity is X, as long as the E-mail address format is correct, the destination mail server will “believe” the information about the sender identity. Let’s assume that we have improved the awareness of the destination mail server to the fact that some of the senders could be hostile elements. How can we verify the sender identity, so we will be able to trust him?
  • 10. Page 10 of 17 | What is so special about Spoof mail attack? |Part 3#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 The good news that in nowadays, we have a couple of mail sender authentication standards such as SPF, DKIM and DMARC, that can help is to verify the sender identity. The less good news is that the implementation of this protocol is not so simple because of many reasons that we will review later in the article – The questions that we will need to answer before we start the project of – building a defense system that will protect us from Spoof mail attacks | Part 7#9 The Two Major Flavors Of Spoof E-Mail Attacks A very important subject that I would like to emphasize is that when we use the term – “Spoof E- mail attack,” the term can be translated into two major scenarios: Scenario 1 – Spoof mail attack that is directed towards “other users” (not our users) but the attacker uses our organizational identity when performing the Spoof mail attack. Scenario 2 – Spoof mail attack in which the attack is directed towards our users. The attacker can use a false sender E-mail address which includes our domain name or use an “external E-mail address” (an E-mail address that includes other domain names that represent other organizations with a good reputation that considers as trusted organization. The common association that appears in our mind regarding the Spoof mail attack is related to “scenario 2” in which our users become the victim of Spoof mail attack. Although this type of attack is more “viable” and more tangible, it’s important to emphasize that the other scenario, in which hostile is Stealing our organizational identity and abuse it by
  • 11. Page 11 of 17 | What is so special about Spoof mail attack? |Part 3#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 attacking another organization is also a “problematic scenario” which could lead to unwanted results that can harm our organization’s reputation. Scenario 1 – Spoof mail attack that is directed towards “other users” (not our users). A scenario in which the attacker is “stealing” our organization identity. For example, our organization domain name is – o365info.com A hostile element, present himself by using a sender E-mail address, that includes our domain name such as – ceo@o365info.com The reason that the attacker chooses to use our domain is – probably because our organization is considered as an organization with a good reputation that can be trusted. In this case, the main purpose of the attacker is – persuade the victim (the recipients from the other organization) “believe him” because his identity (his E-mail address that uses our domain name) can be trusted. In this case, the hostile element is using “our organization good reputation” for abusing recipient from other organizations.
  • 12. Page 12 of 17 | What is so special about Spoof mail attack? |Part 3#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 Scenario 2 – Spoof mail attack in which the attack is directed towards our users. A scenario in which the hostile element attacks our organization recipients by presenting false sender identity. The false sender identity which the attacker is using can be implemented in two ways: Scenario 2.1 – the attacker attacks our organization, using a “well know” E-mail address. In this scenario, the attacker uses a false identity that is based on email messages that include a domain name of a company that is well known or, considered as trusted organization.
  • 13. Page 13 of 17 | What is so special about Spoof mail attack? |Part 3#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 Scenario 2.2 – the attacker attacks our organization, using an E-mail address that includes our domain name. This type of scenario is the most “painful” scenario because, in this case, the attacker Disguises himself using the identity of a person from the same organization as the person that he attacks (the victim). An example to such as scenario could be a spear phishing, a specific type of Phishing mail attack, in which the attacker uses an identity of a “well know” person from our organization such as the E-mail address of the company CFO. The attacker uses this identity for attacking Key People in the organization. Because the victim sees a familiar sender’s identity, he is easily tempted to trust the “sender E- mail”.
  • 14. Page 14 of 17 | What is so special about Spoof mail attack? |Part 3#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 Note – technically speaking, regarding the scenario in which the Phishing mail attack is pointed toward our organization users, there could be an additional variation on this scenario in which the hostile element does not bother to “cover his real identity” using a “good fake identity” and instead, uses a general identity or public mail provider such as Yahoo, Hotmail, Gmail, etc. Spoof E-Mail Attacks | What Are The Possible Damages? Let’s briefly review the most obvious damages in the case that the attacker manages to execute his Spoof E-mail attack. As mentioned before, in reality, that hostile element is not satisfied with Spoof E-mail attack because he cannot gain anything by succeeding the complete this type of attack. The attacker uses the Spoof E-mail attack as an “appetizer” for the “main course.” course”. The optional damage in case that the hostile element manages to complete the attack (such as Spoof E-mail attacks and Phishing E-mail attacks) is the damage that will be realized from the specific attack that was executed.
  • 15. Page 15 of 17 | What is so special about Spoof mail attack? |Part 3#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 For example – in as scenario of an E-mail message that includes a malware, the damage that we will experience, depend on the malicious activity that the malware was programmed to do. Another question that can appear in our mind could be – is this is the only damage that can happen? Is there a possibility for additional and further damages? The damages of the “attack” could be a minor damage but on the other side, can cause a huge damage. For example, let’s assume that the attacker executes Phishing E-mail attacks (that include a Spoof E-mail attack) in which he persuaded the company CEO to transfer to his bank account the amount of money worth 500, 000$.$. What could be the damage of this attack beside of the financial loss? The damage could be a “CEO rage attack,” which can lead to a scenario in which we need to update our CV because we need to look for a new job (the politically-correct term is – looking for a new challenge).
  • 16. Page 16 of 17 | What is so special about Spoof mail attack? |Part 3#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 A scenario in which the attacker uses our organizational identity for attacking other victims. Now, let’s talk about the possible damages in a scenario, in which the hostile element uses our organization identity and attacks another organization. Let’s assume that the attacker manages to complete the attack, and let’s assume that we don’t care what is the damage caused by another organization. So what do we care if a hostile element uses our organizational identity? The answer is that we should care! The fact that the attack was executed using “our identity” is very bad for our reputation. In many scenarios, the “other organization” that was the victim of the Spoof E-mail attack, will reward us be reporting this information to blacklist providers. The process in which our domain name is registered in the email blacklist is quite simple (because there is real evidence for the fact that our organization “attack” other organizations). The process of “delist,” in which we recognize that our domain name appears in a well know blacklists, and we ask to remove our name from this “respectable list”, is not so simple and in many cases, could be a long exhausting process.
  • 17. Page 17 of 17 | What is so special about Spoof mail attack? |Part 3#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 Meanwhile, while our domain name appears on a blacklist, the outcome could be that many of the outgoing E-mail messages that sent by organization users to external recipients, will be blocked or rejected by the destination mail infrastructure because our domain name appears as a problematic domain. Additional reading Video lecture  How To Avoid Falling Prey To Phishing Scams The next article in the current article series is What is the meaning of mail Phishing attack in simple words? | Part 4#9