CEH.V6.-.Module.40.Spamming

Reproduction is strictly prohibited how spamming is

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ght © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited How Spamming is Performed (cont (cont’d) How Spam is Relayed • Rogue ISPs obtain their own network numbering and multiple domain names from the interNIC using which spammers manage to get across spam blocks • On-the-fly Spammers - Spammers register as genuine users for trial accounts with ISPs and use forged identities to start spam hits • Blind Relayers – Some servers relay a message without authentication which is send as genuine mail Getting passed the anti spam softwares • The subject line of the email is given as ‘Re: or Fw:’ assures the anti spam softwares that it is a genuine reply to users message • The spam message is enclosed as an image in the mail to make the anti spam software trust the source EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Ways of Spamming Usenet spam • It is a single message sent to 20 or more Usenet newsgroups • It robs users of the newsgroups by It overwhelming them with a barrage of advertising or other irrelevant posts Email Spam • Email spam targets individual users with direct direct mail messages • Email spam lists are often created by scanning Usenet postings, stealing Internet mailing lists, or searching the Web for addresses EC-Council Spam Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Spammer: Statistics Source: http://www.spamhaus.org/ EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Worsen ISP: Statistics Source: http://www.spamhaus.org/ EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Top Spam Effected Countries: Statistics Statistics Source: http://www.spamhaus.org/ EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Types of Spam Attacks Hidden text & links • Making the text look same as the back ground color Double tags • Giving duplicate title tags and Meta tags Cloaking • This is done by showing different pages to search engine and users Blog Blog & Wiki spamming • Wiki’s are used to add or update the content of any page on the website • This spamming allows the spammers to automatically run crawlers which hunt out blogs and then post keyword text links EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Types of Spam Attacks (cont’d) Image Spam • In this type of spamming, emails containing only images without any text are sent by spammers to evade security systems/controls Hijacking/pagejacking • Redirecting a page which improves the page rank of the redirected page EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Spam Bulk Emailing Tools EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Fairlogic Worldcast Fairlogic Worldcast bulk emailing tool is a customized mailer and also an address validator It detects many common bad addresses existing on the mailing lists li It provides a detailed logs of the entire delivering process and r...
View Full Document

This note was uploaded on 02/12/2013 for the course CEH v6 taught by Professor John during the Summer '13 term at West Point.

Ask a homework question - tutors are online