Chapter 4. Probing E-mail Communications
Messages have been exchanged since centuries; however, the means to exchange these messages have evolved, and privacy has become a bigger and more important concern than ever before. From the time when messengers were used to deliver messages physically to the recent times when the Internet is used to deliver messages, the vulnerabilities have existed and are not completely fixed, even today. In this chapter, we will look at a contemporary way of messaging, that is e-mails, and the security threats it brings to the table.
In this chapter we will learn the following:
- How to use Wireshark to detect numerous attacks on SMTP
- Solve SMTP forensics challenges using Wireshark and a bit of Python
- Important filters to ...
Get Wireshark Network Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.