Chapter 4. Probing E-mail Communications
Messages have been exchanged since centuries; however, the means to exchange these messages have evolved, and privacy has become a bigger and more important concern than ever before. From the time when messengers were used to deliver messages physically to the recent times when the Internet is used to deliver messages, the vulnerabilities have existed and are not completely fixed, even today. In this chapter, we will look at a contemporary way of messaging, that is e-mails, and the security threats it brings to the table.
In this chapter we will learn the following:
- How to use Wireshark to detect numerous attacks on SMTP
- Solve SMTP forensics challenges using Wireshark and a bit of Python
- Important filters to detect unusual SMTP traffic
In the 1960s, we were introduced to electronic mail (e-mail), and since then it has become the de facto standard to exchange messages over the Internet whether casually or professionally. The protocols used in...