Skip to Main Content
Phishing Exposed
book

Phishing Exposed

by Lance James, Dave Jevans
November 2005
Intermediate to advanced content levelIntermediate to advanced
450 pages
11h 24m
English
Syngress
Content preview from Phishing Exposed
6. Client e-mail user Receiver contacts mail.receivingemail.com (again, local
DNS is used), makes a request to the POP3 port (110), and asks to
retrieve its e-mail.The e-mail is delivered to the e-mail client, and
Receiver happily reads the e-mail.
Anonymous E-Mail
Technology sector experts well know that SMTP was not designed with security
in mind. E-mail is trivial to forge, and in more than one way, forged e-mail can
be passed with ease to the mail transport agent (SMTP server). As we already are
aware, spammers forge e-mails, and since phishers are classified as spammers, they
take on this practice as well. Most spammers tend to forge e-mails for ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

A Machine-Learning Approach to Phishing Detection and Defense

A Machine-Learning Approach to Phishing Detection and Defense

O.A. Akanbi, Iraj Sadegh Amiri, E. Fazeldehkordi
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

Robin Dreeke, Michele Fincher, Christopher Hadnagy
Ransomware

Ransomware

Allan Liska, Timothy Gallo

Publisher Resources

ISBN: 9781597490306