19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

264<br />

Part V: Hacking Applications<br />

The final period marks the end of the message. After you enter this final<br />

period, your message will be sent if relaying is allowed.<br />

8. Check for relaying on your server:<br />

• Look for a message similar to Relay not allowed coming back<br />

from the server.<br />

If you get a message similar to this, SMTP relaying is either not<br />

allowed on your server or is being filtered because many servers<br />

block messages that appear to originate from the outside yet come<br />

from the inside.<br />

You might get this message after you enter the rcpt to: command.<br />

• If you don’t receive a message from your server, check your Inbox<br />

for the relayed e-mail.<br />

If you receive the test e-mail you sent, SMTP relaying is enabled on<br />

your server and probably needs to be disabled. The last thing you<br />

want is to let spammers or other attackers make it look like you’re<br />

sending tons of spam, or worse, to be blacklisted by one or more<br />

of the blacklist providers. Ending up on a blacklist can disrupt<br />

e-mail sending and receiving — not good for business!<br />

Countermeasures against SMTP relay attacks<br />

You can implement the following countermeasures on your e-mail server to<br />

disable or at least control SMTP relaying:<br />

✓ Disable SMTP relay on your e-mail server. If you don’t know whether<br />

you need SMTP relay, you probably don’t. You can enable SMTP relay<br />

for specific hosts on the server or within your firewall configuration.<br />

✓ Enforce authentication if your e-mail server allows it. You might be<br />

able to require password authentication on an e-mail address that<br />

matches the e-mail server’s domain. Check your e-mail server and client<br />

documentation for details on setting up this type of authentication.<br />

E-mail header disclosures<br />

If your e-mail client and server are configured with typical defaults, a malicious<br />

attacker might find critical pieces of information:<br />

✓ Internal IP address of your e-mail client machine (which can lead to the<br />

enumeration of your internal network)<br />

✓ Software versions of your client and e-mail server along with their<br />

vulnerabilities<br />

✓ Hostnames that can divulge your network naming conventions

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!