Quantcast
Channel: SPF - o365info
Browsing latest articles
Browse All 18 View Live

Image may be NSFW.
Clik here to view.

What is SPF record good for? | Part 7#17

The current article focused on explaining the purpose of the SPF record and, how does the SPF record enable us to prevent a scenario in which hostile elements, could send E-mail on our behalf. The...

View Article



Image may be NSFW.
Clik here to view.

Implementing SPF record | Part 8#17

The current article is a continuation of the previous article: What is SPF record good for? | Part 7#17 The previous article focused upon the purpose of the SPF record and why is it so important for...

View Article

Image may be NSFW.
Clik here to view.

How can hostile element execute Spoof E-mail attack and bypass existing SPF...

In the current article series, we will learn about a structured vulnerability of the SPF mail standard, which can be easily exploited by a hostile element. The hostile element that is aware of this...

View Article

Image may be NSFW.
Clik here to view.

How to simulate Spoof E-mail attack and bypass SPF sender verification? | 2#2

In the current article, we will demonstrate how to simulate Spoof E-mail attack, that will bypass existing SPF sender verification implementation. The current article series includes two articles.The...

View Article

Image may be NSFW.
Clik here to view.

How does sender verification work? (How we identify Spoof mail) | The five...

The process of “sender verification”, enables us to distinguish between a legitimate sender vs. an attacker who spoofs his identity and prevent a possible Spoof mail attack. In the current article, we...

View Article


Image may be NSFW.
Clik here to view.

Using sender verification for identifying Spoof mail | SPF, DKIM, DMARC,...

Spoof mail attack is implemented by a hostile element the try to spoof sender identity. The way for dealing with a Spoof mail attack is, by applying a procedure, which check and verify the sender...

View Article

Image may be NSFW.
Clik here to view.

Implementing SPF Fail policy using Exchange Online rule (dealing with Spoof...

In the current article, we will review how to implement an SPF Policy for incoming mail by using an Exchange rule. In our scenario, we want to identify an event, in which a hostile element tries to...

View Article

Image may be NSFW.
Clik here to view.

Implementing SPF Fail policy using Exchange Online rule (dealing with Spoof...

The current article is the last article in the article series, in which we review how to implement SPF Fail policy using Exchange Online rule. Just a quick reminder, our main goal is to detect and...

View Article


Image may be NSFW.
Clik here to view.

How to manage SPF record in an Office 365 based environment

In the current article, we will review the subject of managing SPF record in an Office 365 based environment.The tasks that we will examine are: How to get the value of the SPF record that represents...

View Article

Browsing latest articles
Browse All 18 View Live




Latest Images