Final Lab - Spam Group 10: Scott Durr Stephen Thompson.

Slides:



Advertisements
Similar presentations
Basic Communication on the Internet:
Advertisements

CCNA – Network Fundamentals
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Dealing With Spam The kind, not the Food product.
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
By Won Lee.  Stands for Simple Mail Transfer Protocol  Used for sending and receiving electronic mail efficiently and reliably  Daily function of life.
COS 125 DAY 4. Agenda Questions from last Class?? Today’s topics Communicating on the Internet Assignment #1 due Assignment #2 will be posted next week.
Remote mailbox access gateway Software lab project.
COS/PSA 413 Day 17. Agenda Lab 8 write-up grades –3 B’s, 1 C and 1 F –Answer the Questions!!! Capstone progress report 2 overdue Today we will be discussing.
Sender policy framework. Note: is a good reference source for SPFhttp://
Chapter 4 Creating a Website from an InDesign Layout.
Magaly Mosleh Melissa Francis.  Definition and difference  How to use it?  Providers.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.
Spam Reduction Techniques Using greylisting and SpamAssassin.
Managing and Avoiding Junkmail. Junk  Where does Junk Mail come from? People with whom you do business  Pepsi Friends of people with whom you.
OCR Functional Skills Keywords Use the right keywords To do this you need to know what it is you are searching for! – For example, you might want to search.
1. Introduction The underground Internet economy Web-based malware The system analyzing the post-infection network behavior of web-based malware How do.
-I CS-3505 Wb_ -I.ppt. 4 The most useful feature of the internet 4 Lots of different programs, but most of them can talk to each.
CT NIKHEF Nov Mail NIKHEF CT system support.
Hosted Exchange The purpose of this Startup Guide is to familiarize you with ExchangeDefender's Exchange and SharePoint Hosting. ExchangeDefender.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Sending Mark Kruger Coldfusionmuse.com Cfwebtools.com.
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
Combating Abuse Brian Nisbet NOC Manager HEAnet.
1 Web Server Administration Chapter 8 Providing Services.
The Linux Operating System Lecture 7: Tonga Institute of Higher Education.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
思科网络技术学院理事会. 1 Application Layer Functionality and Protocols Network Fundamentals – Chapter 3.
Securing Microsoft® Exchange Server 2010
TCP/IP Protocol Suite 1 Chapter 20 Upon completion you will be able to: Electronic Mail: SMTP, POP, and IMAP Understand four configurations of architecture.
FTP (File Transfer Protocol) & Telnet
Internet Overview Part II Mrs. Wilson Internet Basics & WAY Beyond!
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Reporter: Li, Fong Ruei National Taiwan University of Science and Technology 9/19/2015Slide 1 (of 32)
(or ?) Short for Electronic Mail The transmission of messages over networks.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
Network Services Networking for Home & Small Business.
HOW WEB SERVER WORKS? By- PUSHPENDU MONDAL RAJAT CHAUHAN RAHUL YADAV RANJIT MEENA RAHUL TYAGI.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. WEB.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Spamscatter: Characterizing Internet Scam Hosting Infrastructure By D. Anderson, C. Fleizach, S. Savage, and G. Voelker Presented by Mishari Almishari.
Studying Spamming Botnets Using Botlab 台灣科技大學資工所 楊馨豪 2009/10/201 Machine Learning And Bioinformatics Laboratory.
Security Technology Clients and Mail Servers
1 Figure 9-6: Security Technology  Clients and Mail Servers (Figure 9-7) Mail server software: Sendmail on UNIX, Microsoft Exchange,
SMTP / MIME Florin Zidaru.
NetTech Solutions Microsoft Outlook and Outlook Express Lesson Four.
26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
  is a system of electronic communication that allows the user to exchange messages over the internet  Everyone’s address is unique  Two.
Sender policy framework. Note: is a good reference source for SPFhttp://
CITA 310 Section 6 Providing Services (Textbook Chapter 8)
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Enumeration. Definition Scanning identifies live hosts and running services Enumeration probes the identified services more fully for known weaknesses.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
554 Access Denied Fermilab’s Experiences with Spamcop.net Kevin Hill Ray Pasetes Jack Schmidt.
[1] Control Spam by the Use of Greylisting Torgny Hallenmark LDC - Computing Center Lund University, Sweden TERENA Networking.
Analysing s Michael Jones. Overview How works Types of crimes associated with Mitigations Countermeasures Michael Jones2Analsysing s.
Don’t click on that! Kevin Hill.  Spam: Unwanted commercial ◦ Advertising ◦ Comes from people wanting to sell you stuff. ◦ Headers may be forged.
TMG Client Protection 6NPS – Session 7.
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
Topic 5: Communication and the Internet
ICT Communications Lesson 5: Communicating Using
Chapter 7 Network Applications
Presentation transcript:

Final Lab - Spam Group 10: Scott Durr Stephen Thompson

Outline Introduction Introduction Set up Set up Obtaining Addresses Obtaining Addresses Sending Mass s Sending Mass s Filtering & Stopping Spam Filtering & Stopping Spam

Introduction Almost 90% of is now considered Spam! –Messaging Anti-Abuse Working Group Report #6, Oct 2007 Huge drain on resources Huge drain on resources Strains the infrastructure Strains the infrastructure Distracts/Annoys us all Distracts/Annoys us all Major delivery mechanism for Malware! Major delivery mechanism for Malware!

The Costs The State of California estimates Spam cost the state’s economy $1.2 billion in The estimate the entire US suffered a $10 billion loss in that same year. The State of California estimates Spam cost the state’s economy $1.2 billion in The estimate the entire US suffered a $10 billion loss in that same year. – That was in 2003… That was in 2003…

Our Set Up Host Machine: RedHat7.2 Machine: Servers WinXP: WinXP2: Clients

Major Software Packages Apache2 Web Server Apache2 Web Server Sendmail Server w/ SpamAssasin Sendmail Server w/ SpamAssasin –Included on lab installs of Redhat 7.2 and Redhat WS 4.0 Qpopper Qpopper –POP3 server PINE PINE Outlook Express Outlook Express –Included with WinXP Evolution Evolution –Included with RedHat Spam software: Spam software: –Atomic Hunter & Atomic Sender

Two Servers Set up with slightly different rules for comparison Set up with slightly different rules for comparison Were NOT able to SMTP between Sendmail servers because Sendmail MUST have DNS running in order to find other servers. Were NOT able to SMTP between Sendmail servers because Sendmail MUST have DNS running in order to find other servers. –We didn’t want to tackle the additional setup. –We could accomplish what we wanted without it.

Obtaining Addresses Many different methods, but we focus on: Many different methods, but we focus on: – address spider –Anonymous FTP trick –Verification of addresses at the server

Address Spiders Crawl the web and copy anything that looks like an address. Crawl the web and copy anything that looks like an address. Implemented a basic one with wget and grep, using a regular expression: Implemented a basic one with wget and grep, using a regular expression: wget –rFO lotsofhtml.txt egrep –rhoie lotsofhtml.txt That regex is: Example Example

“Atomic Hunter” Commercial Windows program that implements an address spider. Commercial Windows program that implements an address spider. Tested on the same dummy websites as our homemade one. Tested on the same dummy websites as our homemade one. Has a lot more features. Has a lot more features.

Anonymous FTP A throwback from the days of old: Anonymous FTP logins require an address as a password! A throwback from the days of old: Anonymous FTP logins require an address as a password! Set up your web page to grab images via FTP vice HTML and some browsers will cough up an address. Set up your web page to grab images via FTP vice HTML and some browsers will cough up an address. Tested on Mozilla and IE: they give dummy addresses. Tested on Mozilla and IE: they give dummy addresses.

Verifying Addresses Why is this important? Why is this important? –A “good” list will minimize alerts that might catch the spammer. –Allows for a ‘guess and test’ method of address discovery. VRFY and EXPN VRFY and EXPN –Ask the server if an address is good (VRFY) –Ask the server about an alias/list (EXPN) –Disable these!

Verifying Addresses During the SMTP exchange, you pass a “TO” address to the server. It will come back and tell you if it is good! During the SMTP exchange, you pass a “TO” address to the server. It will come back and tell you if it is good! header implemented by many clients: header implemented by many clients: Return-Receipt-To: Return-Receipt-To: X-Confirm-Reading-To: X-Confirm-Reading-To: Make sure you disable these as defaults in Outlook and others!

Defeating those Spiders Two choices Two choices –Hide your address –Actively counter spiders

Hide your address Use script to return an address instead of putting the address in code. Use script to return an address instead of putting the address in code. ECE does this for their faculty! ECE does this for their faculty! Great example, courtesy of Mr. Tim Williams at U. Arizona: Great example, courtesy of Mr. Tim Williams at U. Arizona:

WPoison Available at Available at Actively thwarts spiders by generating random pages with more links and addresses. Actively thwarts spiders by generating random pages with more links and addresses. Each link leads right back to WPoison! Each link leads right back to WPoison! –Run the spider in a circle, filling it with garbage. –We have a video

WPoison Movie

Sending Mass s Methods Methods 1. Use your own (school/isp) SMTP server You will probably get caught and shut down! You will probably get caught and shut down! 2. Use another, third party SMTP server You will probably be blocked from Relaying You will probably be blocked from Relaying 3. Connect directly to the recipient’s server This takes some work, and you might get blacklisted This takes some work, and you might get blacklisted 4. Do any of the above via a Bot Net Even if you get caught, you don’t get blocked! Even if you get caught, you don’t get blocked!

Our Simulations Host Machine: RedHat7.2 Machine: Servers WinXP: WinXP2: Clients Fictional yahoo.com Method #4: Bot Net Method # 1: Use your SMTP Server Method #2: Use a Third Party SMTP Server Method #3: Connect Directly to Victim’s SMTP Server

Mass Countermeasures Limit who can send on your server Limit who can send on your server –Only users on the domain can “RELAY” –Use a blacklist to prevent connections from known spammers Filter messages as they come in Filter messages as they come in

SpamAssassin Open source & extremely common Open source & extremely common Very complex Very complex –Lots of rules –Uses scores to determine what is spam –Has learning capabilities Can connect to services to receive rules and blacklists Can connect to services to receive rules and blacklists – More info at: More info at:

SpamAssassin in the Lab We walk through the setup of some basic rules. We walk through the setup of some basic rules.

Your Last Line of Defense… The client The client Web-based clients can rapidly aggregate feedback and build more responsive filters. Web-based clients can rapidly aggregate feedback and build more responsive filters. Gmail, Yahoo, Hotmail, etc. Gmail, Yahoo, Hotmail, etc.

In the Lab Summary Set up Servers Set up Servers Harvest s Harvest s – Address Spiders: wget/grep & Atomic –FTP method Experiment with address verification Experiment with address verification Send mass s through each scenario Send mass s through each scenario –Use manual connection and Atomic Sender Implement some countermeasures Implement some countermeasures –RELAY limitations –WPoison –Hide Addresses Install, setup, and test SpamAssassin Install, setup, and test SpamAssassin

Questions?