Saturday, May 21, 2011

E-mail spoofing

email spoofing

E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spamoften use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately. Classic examples of senders who might prefer to disguise the source of the e-mail include a sender reporting mistreatment by a spouse to a welfare agency or a "whistle-blower" who fears retaliation. However, spoofing anyone other than yourself is illegal in some jurisdictions.
E-mail spoofing is possible because Simple Mail Transfer Protocol (SMTP), the main protocol used in sending e-mail, does not include an authentication mechanism. Although an SMTP service extension (specified in IETF RFC 2554) allows an SMTP client to negotiate a security level with a mail server, this precaution is not often taken. If the precaution is not taken, anyone with the requisite knowledge can connect to the server and use it to send
messages. To send spoofed e-mail, senders insert commands in headers that will alter message information. It is possible to send a message that appears to be from anyone, anywhere, saying whatever the sender wants it to say. Thus, someone could send spoofed e-mail that appears to be from you with a message that you didn't write.
Although most spoofed e-mail falls into the "nuisance" category and requires little action other than deletion, the more malicious varieties can cause serious problems and security risks. For example, spoofed e-mail may purport to be from someone in a position of authority, asking for sensitive data, such as passwords, credit card numbers, or other personal information -- any of which can be used for a variety of criminal purposes. The Bank of America, eBay, and Wells Fargo are among the companies recently spoofed in mass spam mailings. One type of e-mail spoofing, self-sending spam, involves messages that appear to be both to and from the recipient.
Resources from around the Web
Spoofed/Forged EmailThis document provides a general overview of email spoofing and the problems that can result from it. It includes information that will help you respond to ...
www.cert.org/tech_tips/email_spoofing.html

CERT Advisory CA-1996-21 TCP SYN Flooding and IP Spoofing AttacksThis advisory supersedes the IP spoofing portion of CA-95.01. ..... 19, 1996 Updates - corrected Sun Microsystems security-alert email address. Dec. ...
www.cert.org/advisories/CA-1996-21.html

Email Spamming and Email SpoofingThis document gives advice on the what email spamming and spoofing is.
www.lse.ac.uk/itservices/help/spamming&spoofing.htm

E-mail spoofing - Wikipedia, the free encyclopediaE-mail spoofing is a term used to describe fraudulent email activity in which the sender address and other parts of the email header are altered to appear ...
en.wikipedia.org/wiki/E-mail_spoofing

G4 - Feature - What is Email Spoofing?Email spoofing is the practice of changing your name in email so that it looks like the email came from somewhere or someone else. ...
www.g4tv.com/techtvvault/features/17167/What_is_Email_Spoofing.html

1 comment:

  1. Well written article. A good and healthy topic for discussion. I shared your article with my friends and we have a seminar on this topic also. Thanks for the new topic and the new information.
    digital signature PDF

    ReplyDelete