Overview What is Spoofing Types of Spoofing

Slides:



Advertisements
Similar presentations
Basic Communication on the Internet:
Advertisements

Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
1 Electronic Mail u Three major components: u user agents u mail servers u simple mail transfer protocol: SMTP u User Agent u a.k.a. “mail reader” u composing,
SMTP – Simple Mail Transfer Protocol
(SMTP, MIME) Message transfer protocol (SMTP) vs message format protocols (RFC 822, Multipurpose Internet Mail Extensions or MIME) Message transfer.
TCP/IP Protocol Suite 1 Chapter 20 Upon completion you will be able to: Electronic Mail: SMTP, POP, and IMAP Understand four configurations of architecture.
How does a simple protocol like the protocol SMTP work 1. Open telnet connection Do remote login to the system you want to send to Note: You.
Tracking the source of spam by examining its header Anh Nguyen May 3 rd, 2010.
Electronic Mail and SMTP
Chapter 30 Electronic Mail Representation & Transfer
Esimerkki: Sähköposti. Lappeenranta University of Technology / JP, PH, AH Electronic Mail Three major components: user agents mail servers simple mail.
POP Configuration Microsoft Outlook Express 6.x.
Simple Mail Transfer Protocol
Introduction 1 Lecture 7 Application Layer (FTP, ) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
Spam Sonia Jahid University of Illinois Fall 2007.
Electronic Mail: SMTP, POP, and IMAP
SIMPLE MAIL TRANSFER PROTOCOL SECURITY Guided By Prof : Richard Sinn Bhavesh Jadav Mayur Mulani.
Lecturer : Ms.Trần Thị Ngọc Hoa Chapter 8 File Transfer Protocol – Simple Mail Transfer Protocol.
 ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.
1 Introduction AfNOG CHIX 2011 Blantyre, Malawi By Evelyn NAMARA.
SMTP, POP3, IMAP.
Mail Services.
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
Intro to Computer Networks Bob Bradley The University of Tennessee at Martin.
Review: –How do we address “a network end-point”? –What services are provided by the Internet? –What is the network logical topology observed by a network.
Application Layer Protocols Simple Mail Transfer Protocol.
Lecturer: Maxim Podlesny Sep CSE 473 File Transfer and Electronic in Internet.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
A form of communication in which electronic messages are created and transferred between two or more devices connected to a network.
FTP (File Transfer Protocol) & Telnet
Prof. John A. Copeland fax Office: Klaus
Simple Mail Transfer Protocol (SMTP)
1 Using Messages sent from machine to machine and stored for later reading. You will use a client to read –Type mail or pine in UNIX to read.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
File Transfer Protocol (FTP)
1 SMTP - Simple Mail Transfer Protocol –RFC 821 POP - Post Office Protocol –RFC 1939 Also: –RFC 822 Standard for the Format of ARPA Internet Text.
Delivery for Spam Mitigation Usenix Security 2012 Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher.
How does a simple protocol like the protocol SMTP work 1. open telnet & do remote login in to the system you want to send to.
LinxChix And Exim. Mail agents MUA = Mail User Agent Interacts directly with the end user  Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,
SMTP / MIME Florin Zidaru.
SMTP - Simple Mail Transfer Protocol RFC 821
CS440 Computer Networks 1 Neil Tang 12/01/2008.
Slides based on Carey Williamson’s: FTP & SMTP1 File Transfer Protocol (FTP) r FTP client contacts FTP server at port 21, specifying TCP as transport protocol.
CIT 140: Introduction to ITSlide #1 CSC 140: Introduction to IT Electronic Mail.
Discussion of OCP/SMTP profile and some Use cases Presented by Abbie Barbir
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Analysing s Michael Jones. Overview How works Types of crimes associated with Mitigations Countermeasures Michael Jones2Analsysing s.
Spring 2006 CPE : Application Layer_ 1 Special Topics in Computer Engineering Application layer: Some of these Slides are Based on Slides.
درس مهندسی اینترنت – مهدی عمادی مهندسی اینترنت برنامه‌نویسی در اینترنت 1 SMTP, FTP.
concepts & protocols
SMTP - Simple Mail Transfer Protocol POP - Post Office Protocol
Networking Applications
SMTP By Antoinette Davis.
SMTP: simple mail transfer protocol
HTTP – An overview.
Networking CS 3470, Section 1 Sarah Diesburg
An Application with Active Spoof Monitoring and Control
Unix System Administration
Roadrunner Error 530 Call 1 (888) Toll-free
Fix Thunderbird Error 5.7.1 Call Toll-free
HTTP Protocol.
Chapter 6: Distributed Applications
Chinese .
SMTP, POP3, IMAP.
Social Media And Global Computing Sending
Chapter 2: Application layer
Chinese .
William Stallings Data and Computer Communications
Uniform Resource Locators (URLs)
Presentation transcript:

Exercise 9: Email Spoofing

Overview What is Email Spoofing Types of Spoofing Identifying Spoofed Emails Understanding Email Headers Conclusion

What is Email Spoofing Due to the lack of authentication in the email protocol (SMTP), attackers and spammers can easily obfuscate the origin of their email. Attackers use spoofed email messages to propagate viruses, Trojans, and worms. Criminals use them for phishing schemes. Simple Mail Transfer Protocol

Types of Email Spoofing Open Mail Relay (misconfigured server) Self-Owned Mail Servers Compromised Machines Hijacked Email Accounts Temporary Accounts

Exercise: Spoofing Email Type the following into the command line startx Then hit ‘enter’

Exercise: Spoofing Emails Click the Terminal at the bottom left of the screen and type the the following: cd /etc/init.d/ sendmail start

Exercise: Spoofing Emails Open a second Terminal keeping the first open and type: sendmail

Exercise: Email Spoofing Open a third Terminal keeping the other two open and type: telnet 127.0.0.1 25

Exercise: Email Spoofing In the same terminal as before, type: helo 127.0.0.1 25 email from: <professor@auburn.edu> rcpt to: <youremailaddress@yourprovider.com> data date: thu 13 Sept 2012 subject: Class Cancelled Class has been cancelled tomorrow. .

Exercise: Email Spoofing Go to Start Menu in the bottom-left, click on internet then firefox. Go to your email provider and type in your credentials and the email should be there. Provided port 25 isn’t blocked.

Identifying Spoofed Email There are a number of telltale signs that may indicate an email is not legitimate. All of them involve interpreting a message’s headers.

Understanding Email Headers Headers are added when the email is handled by different parties. Understanding headers is necessary to identifying and tracing spoofed email. 3 Return-Path: <alice.price@alphanet.com> Received: from smtp.alphanet.com (smtp.alphanet.com [192.168.0.100]) by mailhost.betanet.com with smtp (Exim 4.44)id 1DtsVC-0001I2-O2 Mon, 25 Jul 2005 11:40:06 -0400 2 Received: from alice.alphanet.com (alice.alphanet.com [192.168.0.5]) by smtp.alphanet.com (8.12.10/8.12.10) with ESMTP id j6PFdtHm024126 for <bob.doe@betanet.com>; Mon, 25 Jul 2005 11:39:55 -0400 Message-ID: <42E507CC.2080100@alphanet.com>   1 Date: Mon, 25 Jul 2005 11:39:55 -0400 From: Alice Price <alice.price@alphanet.com> User-Agent: Mozilla Thunderbird 1.0.6 (Windows/20050716) X-Accept-Language: en-us, en MIME-Version: 1.0 To: Bob Doe <bob.doe@betanet.com> Subject: Lunch Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit The useful information is in the "Received:" lines. Each of these lines represents a hop between two mail servers on the path from the sender to the recipient. These can also be forged, but there is a catch: A malicious mail server can forge the current headers, and at the end will have to send the mail to legitimate mail servers. The legitimate mail servers WILL RECORD the IP address of the sending e-mail server, and this information will ALWAYS BE TRUE. So, the malicious sender has no control over the Received lines of the header.

Conclusion Threat of Email Spoofing Types Detecting and Identifying

Questions?