Lab 8 Spoofing - l 2010#8 l Spoofing and Tracing by Team 3 Ron Stellabotte [email protected] Table of Contents Executive Summary The dilemma of email

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
a ll 2010 b #8 il Spoofing and Tracing by Team 3 – Ron Stellabotte – [email protected],
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Table of Contents Executive Summary The dilemma of email spoofing, spamming and phishing related to identity theft has been a growing problem since the beginnings of the Internet. The problem is that it does not have an end in sight, and it can reach just about every single person with an email address on the face of the Earth. Another problem is that many people simply do not know how to protect themselves from these types of threats, sometimes
Background image of page 2
because they do not know that they exist. There are tools available to track and defend against these harmful attacks. This lab explores several and how they can be used by average users. Section I – Exploration Task 1: Email Spoofing: 1. Explore and discuss the process of spoofing email. Spoofing email is the process of disguising your email address and making it seem as if the email is coming from another address. This disguised address will be seen by the receiver in the ‘from’ section of the email header. From the Spoofer’s point of view this could be done for several reasons, such as: a spammer not wanting their email address associated with spam so that they cannot be subject to anti- spamming laws, pretending to be someone their not in order to get information from you that they would not normally be able to get such as banking information, etc. 2. Which type of information can be spoofed? Information in the email header can be spoofed such as the reply- to and sent from fields in emails using SMTP because it does not have authentication. 3. Is it legal to hide/alter sender information? In some states there is legislation regarding the prohibition of using third party servers or their domain
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/10/2010 for the course IST 454 taught by Professor Staff during the Fall '08 term at Pennsylvania State University, University Park.

Page1 / 10

Lab 8 Spoofing - l 2010#8 l Spoofing and Tracing by Team 3 Ron Stellabotte [email protected] Table of Contents Executive Summary The dilemma of email

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online