CEH.V6.-.Module.40.Spamming

Reproduction is strictly prohibited packpal bulk

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: end through the bulk email server EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited PackPal Bulk Email Server: Screenshot Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited IEmailer IEmailer is a bulk email marketing software which is safe to use since it does not use or go through the local ISPs email server It simulates the sending of the email messages to the server you choose, the same one you are verifying email addresses on EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited IEmailer: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Anti Anti-Spam Techniques EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Anti-Spam Techniques Techniques used to eliminate spam are: Heuristic/Signature-based Content Filtering • Messages received are checked to match certain patterns • Scores are assigned based on the patterns and if the score is higher, then the email is an undesired email Bayesian Content Filtering • It filters and sorts the emails into different folders based on the good and undesired mail feed to it Collaborative Collaborative Content Filtering • Many users share their judgment about what is a desired mail and undesired mail • Every time the user receives a mail, a special application suggest whether it is SPAM or not EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Anti-Spam Techniques (cont’d) Black Listing (RBL) • It uses various spam detection tools, to report bad-behavior IP address as a list • The information is collected and stored in a database to filter the spam email based on this information White Listing • It accepts all the emails from certain IP addresses • No other filters can stop an email once it is accepted Greylisting • It does not accept the messages from IP address which are not previously successfully connected to the mail server EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Anti-Spam Techniques (cont’d) Sender Policy Framework • To prevent the sender address forgery, SPF proposes valid email sender register i.e. the IPs of the machines they send email from, using extended DNS records DNS-based Block Lists • It is used to add the spam IP addresses to a local block list MX Callbacks • It supports callbacks which verifies the sender of a message with their MX server Teergrubing • It responds slowly to connected mail servers by using multi line SMTP responses EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Anti-Spam Techniques (cont’d) Reputation Control • It analyzes the email sent by the sender and assigns a score • If the email is found to be legitimate score improves, if not - the score reduces Transparent SMTP Proxy • This software blocks SMTP sessions used used by e-mail worms and viruses on the NA(P)T router • It acts li...
View Full Document

Ask a homework question - tutors are online