Share your knowledge. It’s a way to achieve immortality. Dalai Lama
Post Views: 9,503
Post Views: 9,503 The process of “sender verification”, enables us to distinguish between a legitimate sender versus an attacker who spoofs his identity and prevent a possible Spoof mail attack. In the current article, we will review in details three sender verification standard – SPF, DKIM, DMARC and also two sender verification methods that can…
Post Views: 22,349
Post Views: 22,349 In the current article, we will demonstrate how to simulate Spoof E-mail attack, that will bypass existing SPF sender verification implementation. The current article series include two articles. The former article is – How can hostile element execute Spoof E-mail attack and bypass existing SPF implementation? | introduction | 1#2 Disclaimer For…
Post Views: 6,175
Post Views: 6,175 In the current article series, we will learn about a structured vulnerability of the SPF mail standard, which can be easily exploited by a hostile element. The hostile element that is aware of this SPF vulnerability, can bypass the existing “SPF wall” that was built for protecting our organization recipients from Spoofing…
Post Views: 5,930
Post Views: 5,930 In case that your organization experiences a scenario in which your mail server IP address appear in the Office 365 blacklist, and E-mail messages sent from your mail server is rejected by the Office 365 mail infrastructure (Exchange Online), you can use the Office 365 “delist portal”, which enable you to submit…
Post Views: 33,793
Post Views: 33,793 In the current article, we will review the process of – How to enable outbound DKIM signing in Office 365 for our public domain name. In Office 365 based environment, the process of signing outgoing E-mail using DKIM signature happens automatically for each of the Office 365 tenant domain names. I emphasize…
Post Views: 7,035
Post Views: 7,035 In a scenario in which we want to use outbound DKIM signing for our public domain name in Office 365 based environment, we will need to generate 4 DNS records that will be used for the required two CNAME records. Regarding the task of the required DKIM DNS records, the primary challenge…
Post Views: 5,625
Post Views: 5,625 The desired goal we seek to achieve is – to implement a successful process in which the sender mail infrastructure for use DKIM to Digitally sign the outgoing E-mail message. This option will enable the destination recipient to verify the DKIM data meaning – the sender identity. The purpose of the current…
Post Views: 5,118
Post Views: 5,118 DKIM is implemented by using Digital signature. The “Digital signature” method is one of the main building blocks of the Public key infrastructure. In the current article, I want to show you a fraction of an Interesting and wonderful world of Public key infrastructure and, the way that the DKIM uses this…
Post Views: 7,029
Post Views: 7,029 DKIM (Domain Keys Identified Mail) is a mail security standard that enables the sender to declare about his “identity” and allows the mail destination infrastructure, meaning the receiving mail server, to verify the identity of the originator. The central paradox regarding a security standard is that most of the time, we don’t…
Post Views: 4,748
Post Views: 4,748 In the current article, we will review two subjects that relate to a scenario in which organization experiences a Spoof E-mail attack: Report the Spoof E-mail as “Phishing mail”. Sent the Spoof E-mail for further analysis. Report Spoof E-mail as “Phishing mail” I try to get additional information regarding the subject of…
Post Views: 16,104
Post Views: 16,104 In the current article, we will demonstrate three options for accomplishing the task of simulating E-mail spoof attack. Our primary goal is performing a test, in which verify if the Exchange Online Spoof E-mail rule that we have created is manage to identify an event of Spoof E-mail and respond accordingly. Disclaimer…
Post Views: 5,317
Post Views: 5,317 When we hear the term “spoof E-mail attack,” the initial association that appears to our mind is – a hacker sitting in a dark room, filled with flashing lights, which quickly tap the keyboard commands and strange markings! Sound romantic? Well, in reality, the ability to perform or simulate E-mail spoof attack…