Page 89 - StudyBook.pdf
P. 89

General Security Concepts: Attacks • Chapter 2  73

                         Look for the MX entry with the lowest preference; in this case
                      mail.destinationdomain.com.
                         Now, go to Outlook Express, and go to Tools | Accounts and create a
                      new account. In the appropriate screens, enter e-mail
                      sam.carter@sgc.com, name Sam Carter, mail.destinationdomain.com as
                      the mail server, and anything in the username/password fields. Now
                      simply create a new e-mail to your victim, and he or she should receive
                      an e-mail from Dr. Sam Carter. The only way they could tell it is a fake e-
                      mail is by looking at the e-mail headers and verifying the IP address
                      used to send the e-mail—but that’s very hard to do for the average user.
                         Even more, if servers do not have spoof protection configured (so
                      that e-mail FROM a domain cannot also be sent TO a domain), it’s also
                      simple to send an e-mail to your victim posing as his boss. Simply enter
                      his bosses’ name and e-mail address in the account properties.
                         Several frameworks have been proposed to defend against e-mail
                      spoofing, but there’s not a single common adopted. The Sender Policy
                      Framework (SPF) is gaining traction, but it’s still a long way from being
                      a universal standard. In the meantime, users need to be educated on the
                      potential for e-mail spoofing and to use common sense before believing
                      and opening messages and attachments.




                 Web Site Spoofing

                 Web site spoofing occurs when an attacker creates a Web site very similar, if not
                 identical, to another site, usually an e-commerce, banking, or gambling destination.
                 The main purpose of Web site spoofing is to trick the visitors into thinking they
                 are using the original site, so they will enter their credentials (username, password,
                 PIN, and so forth), which will be captured by the owners of the spoofed site.When
                 attackers create a spoofed system, they often just recreate as much of the original as
                 necessary to create an illusion of the real thing.With this façade, they’ve managed
                 to build enough to establish their trick, but have avoided a lot of the complexities
                 that may have been involved with the original system.Armed with the real creden-
                 tials of a valid user, attackers can wreak all kinds of havoc on the victim’s account.
                 Phishing

                 Phishing is a combination of e-mail and Web site spoofing, and it’s one of the most
                 dangerous attacks currently active.The basic Phishing attack starts with a spammer




                                                                              www.syngress.com
   84   85   86   87   88   89   90   91   92   93   94