19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

258<br />

Part V: Hacking Applications<br />

Figure 13-5:<br />

Using VRFY<br />

to verify that<br />

an e-mail<br />

address<br />

exists.<br />

Figure 13-6:<br />

Using EXPN<br />

to verify that<br />

a mailing list<br />

exists.<br />

Account enumeration<br />

A clever way that attackers can verify whether e-mail accounts exist on a<br />

server is simply to telnet to the server on port 25 and run the VRFY command.<br />

The VRFY — short for verify — command makes a server check<br />

whether a specific user ID exists. Spammers often automate this method to<br />

perform a directory harvest attack (DHA), which is a way of gleaning valid<br />

e-mail addresses from a server or domain so hackers know whom to send<br />

spam, phishing, or malware-infected messages to.<br />

Attacks using account enumeration<br />

Figure 13-5 shows how easy it is to verify an e-mail address on a server with<br />

the VRFY command enabled. Scripting this attack can test thousands of<br />

e-mail address combinations.<br />

The SMTP command EXPN — short for expand — might allow attackers to<br />

verify what mailing lists exist on a server. You can simply telnet to your e-mail<br />

server on port 25 and try EXPN on your system if you know of any mailing lists<br />

that might exist. Figure 13-6 shows how the result might look. Scripting this<br />

attack and testing thousands of mailing list combinations is simple.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!