E-mail is not secure. There may be weak links in every process of sending, transmitting and receiving e-mails. Malicious users can easily use their vulnerabilities. Crack out the account and get the content of the email.
First, the use of mail server operating system vulnerabilities
Mail server software is running on a specific operating system, such as Linux, Windows NT/2000. The default installation and configuration of these operating systems is insecure, and hackers can easily invade the system and get all usernames and passwords.
1 Windows Server
If it is a Windows 2000-based Exchange Mail Server, the system itself does not do any security configuration, open several services. The intruder can use the terminal server to combine the Chinese input method vulnerability or the IIS Buffer Overflow program to obtain the Administrator permission, use the pwdump3 to export the Hash password, and then use the L0pht hook dictionary or Brute Force to crack the user password. According to experience, if the password is simple, it can be cracked within a few minutes, and the length of 8 bits or less can be solved in one day by the Brute Force method.
2 Linux/UNIX Server
UNIX systems generally use Sendmail as the mail system. After obtaining control of the system, you can use John and other software from /etc/passwd or /etc. Crack the password in /shadow. If you use the database method to save user information and passwords, it is also easy to export.
Second, the use of the mail server software itself vulnerabilities
The most common mail server programs are Sendmail, Qmail, etc., there are security flaws in varying degrees. Take Sendmail as an example. In the old version, telnet to port 25, enter wiz, and then enter the shell, you can get a rootshell, as well as the debug command, you can also get root privileges. Qmail is relatively secure against Sendmail, but Qpoper has Buffer Overflow flaws, which can remotely get the rootshell and control the system.
Even if the mail server is secure, the intruder can get more information, such as the username. Telnet to port 25, enter expn tom or vrfy tom to query whether the system has a tom user. Although the latest version of Sendmail disables these two commands, it can be used to determine if the user exists by forging the sender and then using rcpt to.
Get the username, you can telnet to port 110, try a simple password connection, or apply a dictionary to crack.
Therefore, it is necessary to prohibit the relay of non-local domain (relay), or use the module that is used by many ISPs to send SMTP authentication, which can enhance the security of the mail server.
In addition to POP3 receiving, it is more popular to process mail on the WEB interface. This method is also not weak, generally accepting the form FORM parameters passed by the user through CGI, including username and password, if it is correct, you can enter the page that processes the mail. Cracking the passwords of known users, there are many softwares that use dictionary or violent combination. The more famous one is Xiaoxie's "Snowing Snow". In the case of simple password, there will be results soon.
The WEB mail system has the option of "forgot password". If you can crack another email address that is sent back to the password or guess the answer to the question, it will succeed.
III. Listening during the transmission of mail
Install Sniffer on the network, specify to listen to the data packets sent to the external server 110 port, and view the user and pass from the collected information. The string will see the username and the corresponding password.
I believe you have encountered such a CD: the total capacity of the C
The following is a presentation of DNF Callets report paperwork task. In the DNF
When many players play Need for Speed 18 games, the system pops up saying that
Unable to delete file resolution
What should I do if the dnf chart system fails to be formed?
Ways to block Taobao's automatic pop-up ads
How to open .pet file, what is pet file
Super bodyguard password crack
How to adjust the smoke head through the fire line cf is best
Nine tricks make the hard drive faster System more stable
Preventive software triggers six "hard injuries" on hard drives
Download method without burdening the system
Save your mind and save trouble. Disk health moves to the desktop
How to change the default input method in win8
Windows 8 Mail Management Features
STM32 timer time calculation method
This computer can be changed to this configuration
Linux uses the scp command to remotely transfer files.
Win10 users through the Tianyi campus client how to network
Win8 start screen use skills Win8 start interface use tutorial
Please upgrade XP 99 to Win8/Win8.1
Windows7 upgrade windows8 tutorial
Win10 technology preview installation method The most simple diagram