Learn from malware! A practical guide of spear phishing for red teams. Paul Jung
|
|
|
- Adrian Black
- 9 years ago
- Views:
Transcription
1 Learn from malware! A practical guide of spear phishing for red teams Paul Jung
2 WARNING Legal disclaimer 2 All the tricks and tips showed here are used in real life No malware were harmed during the preparation of this presentation
3 3 Phishing Steps 1) Reconnaissance 2) Bypass inbound security 3) Phish a user! 4) Bypass outbound security.
4 4 Collecting Ask google! The Harvester
5 5 Collecting Got the format? Then you get everything FirmName inurl:linkedin.com + LinkedIn +Current jdoe vs j.doe vs john.doe
6 6 Abusing mail relay Validate your list Few people look at mail logs Only one tcp connection in firewall logs
7 7 Abusing mail relay $ nc b.mx.root.lu smtp.mx.root.lu ESMTP Postfix rootmta Helo toto 250 smtp.mx.root.lu mail from: [email protected] Ok rcpt to:[email protected] <[email protected]>: Recipient address rejected: User unknown in relay recipient table rcpt to:[email protected] Ok rcpt to:[email protected] <[email protected]>: Recipient address rejected: User unknown in relay recipient table
8 8 Collecting a.doe b.doe c.doe d.doe e.doe f.doe 26 x top common last names Really complicated in luxembourg; German, Luxembourgish, French, Portuguese
9 9 Abusing mail system Spoofing Use same source, old spoofing Use «nearly» same source Homographic equivalent : excelliurm PunyCode for cyrillic
10 10 Abusing mail system Spoofing is usually possible at body level MAIL FROM: RCPT TO: DATA SUBJECT: A common spoof FROM: [email protected] Hello click on my links
11 11 Abusing mail system $ nc mx.luxcloud.net spam1.luxcloud.net ESMTP Exim Wed, 17 Jun :12: helo ns2.trollprod.org 250 spam1.luxcloud.net Hello ns2.trollprod.org [ ] mail from: [email protected] 250 OK rcpt to: [email protected] 250 Accepted data 354 Enter message, ending with "." on a line by itself From: Christophe Bianco <[email protected]> To: [email protected] Subject: Spoofing on body Hello
12 12 Monitor mail gateway Configure anti-brute force Deny mails from unknown domains Use at least SPF Work on all spoofing scenarios Security Tips
13 13 IN: Bypassing gateway Will someone Click on a rogue mail? Well, yes they do!
14 14 IN: Bypassing gateway Last year we have sent ~ s A very bad crafted rogue link An internal sender Click Success rate is nearly 33%
15 15 IN: Bypassing gateway 44 % 56%
16 16 IN: Bypassing gateway Ask to do something : Max 14 % Drop a link without explanation : Max 42 %
17 17 IN: Bypassing gateway Tips for even more efficiency : Use a custom domain
18 18 Right target & good time Top Management Opened on IPAD Too Early / Too Late Opened on Smartphone Medical / Media Opened on a Apple
19 19 Enterprise IN defences AV Relay Sandbox Mail Server
20 20 Enterprise IN defences AV Relay Sandbox Mail Server
21 Exploits / Macros or 21 Executions Exploits are nice but tricky Executions need tricks to bypass Office macro seems oldschool but proven!
22 Exploits / Macros or 22 Executions Outlook avoid direct execution of files Wscript : %SystemRoot%\System32\WScript.exe.js.JSE.VBE.vbs.WSF.WSH Direct Execution : "%1".bat.cmd.com.exe.pif.scr
23 Exploits / Macros or 23 Executions.ade.adp.app.asp.bas.cer.chm.cpl.crt.csh.der.fxp.gadget.hlp.hta.inf.ins.isp.its.ksh.lnk.mad.maf.mag.mam.maq.mar.mas.mat.mau.mav.maw.mda.mdb.mde.mdt.mdw.mdz.msc.msh.msh1.msh2.mshxml.msh1xml.msh2.xml.msi.msp.mst.ops.pcd.plg.prf.prg.pst.reg.scf.sct.shb.shs.ps1.ps1xml.ps2.ps2xml.psc1.psc2.tmp.url.vb.vsmacros.vsw.ws.wsc.xnk Outlook avoid direct execution of files
24 Exploits / Macros or 24 Executions Malware spread is aware Straight.zip.cab Challenging.7z.rar.rxx (.r05)
25 25 IN: Bypassing gateway Dridex campaign is using old school recipe : Embed dropper in an office macro
26 26 IN: Bypassing gateway This year Dridex is innovative Bypass most AV s by using MHTML $ file YU96260MFZ.doc YU96260MFZ.doc: MIME entity, ISO-8859 text, with very long lines, with CRLF line terminators by using macro obfuscation
27 27 Obfuscation 2 Dim VoIOlRMM As Integer VoIOlRMM = 7 Do While VoIOlRMM < 74 DoEvents: VoIOlRMM = VoIOlRMM + 1 Loop strenckey = Mid(strText, nleft + 1, ncharsize) Dim JVremBiP As Integer JVremBiP = 8 Do While JVremBiP < 24 DoEvents: JVremBiP = JVremBiP + 1 Loop strenckey = yik(strenckey) Dim ivymzulc As Integer ivymzulc = 9 Do While ivymzulc < 92 DoEvents: ivymzulc = ivymzulc + 1 Loop GitHub Script
28 28 IN: Bypassing gateway How to bypass workstation s AV for final payload Pack your executable to obfuscate. Your own packer is a good investment Avoid UPX, it triggers some AV s
29 29 IN: Bypassing gateway Try to get a mail from the victim
30 30 IN: Bypassing gateway To bypass AV s sandbox, two tips Do something stupid which creates a delay Fare IT
31 31 Bypass local AV s times the 9 queens problem!
32 32 Bypass local AV s Load an improbable DLL HMODULE hmod = LoadLibrary ("RainbowDash.dll"); if (NULL == hmod) { DO YOUR EVIL PAYLOAD!! }
33 33 Babar Friend s Casper gives a lot of tips for avoiding detection WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayname /Format:List WMIC /Node:localhost /Namespace:\\root\SecurityCenter Path AntiVirusProduct Get displayname /Format:List
34 34 Bypass Sandboxes Dridex again is innovative; Detect VMs & Sandboxie directly in macros
35 35 Bypass Sandboxes Hacking team got an amazing Cuckoo bypass pfake = (LPDWORD) malloc(4096*100); memset(pfake, 1, 4096*100); mov eax, fs:[0x44];" // save old value mov _pold, eax;" mov eax, _pfake;" // replace with fake value mov fs:[0x44], eax; call CreateThread() Full code
36 36 Bypass Sandboxes Hacking team got an amazing Cuckoo bypass
37 37 Bypass Sandboxes Unfortunately; Cuckoo and VMware are not deployed Detect if computer is not a domain member %LOGONSERVER% == \\%COMPUTERNAME% Environ( MyVariable )
38 38 Last Step, Human! Hopefully for us, some customers, and even «big» one, don t have office macro activated!
39 39 Last Step, Human!
40 40 Last Step, Human!
41 41 Block any container files Disable macros Train people Security Tips
42 42 Company OUT defences Proxy
43 43 Company OUT defences Solution A - TCP Socket A really bad idea in enterprise
44 44 Company OUT defences Solution B - API WinHTTP Another bad idea, not easy to go out
45 45 Soon Finished Keep focused, only a few slides left!
46 46 Company OUT defences Solution C - API WinInet Good Idea, used by most malwares Deals with proxy Deals with transparent auth
47 47 Company OUT defences Using NTLM or KERBEROS for transparent auth DONT IMPROVE SECURITY Even a basic one on a separate LDAP is better.
48 48 Enterprise OUT defences Solution D - Dcom Instrumentation Stealthy one Not easy to play with cookies Not easy to employ Reuse any proxy auth See P. Rascagnères IcoScript Analysis
49 49 Company OUT defences Solution E - DNS Enough for controlling Very verbose, but rarely spotted More than often bypass all security
50 50 Avoid automatic authentications Break SSL when possible Monitor DNS Requests Security Tips
51 51 Conclusion We are in 2015 and macro enabled docs do the job!
52 52 Any Questions?? Thanks
Spear Phishing. October 12, 2015 TLP: WHITE. www.excellium-services.com
Spear Phishing October 12, 2015 TLP: WHITE www.excellium-services.com Agenda How it s made Soo easy to find victims Inventory of evils documents The art of spoofing How to react to phishing Basics things
SPAM, VIRUSES AND PHISHING, OH MY! Michael Starks, CISSP, CISA ISSA Fellow 10/08/2015
SPAM, VIRUSES AND PHISHING, OH MY! Michael Starks, CISSP, CISA ISSA Fellow 10/08/2015 The Usual Players Indebtedness for driving on toll road Transaction receipts Notice to appear Major and Emerging Trends
CipherMail Gateway Quick Setup Guide
CIPHERMAIL EMAIL ENCRYPTION CipherMail Gateway Quick Setup Guide October 10, 2015, Rev: 9537 Copyright 2015, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Typical setups 4 2.1 Direct delivery............................
Deploying Layered Email Security. What is Layered Email Security?
Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review
Enabling Remote Management of SQL Server Integration Services
Enabling Remote Management of SQL Server Integration Services [email protected] www.schmittdotnet.com Version 1.0 10/14/2010 Copyright and Disclaimers This guide is for informational purposes only.
User-ID Best Practices
User-ID Best Practices PAN-OS 5.0, 5.1, 6.0 Revision A 2011, Palo Alto Networks, Inc. www.paloaltonetworks.com Table of Contents PAN-OS User-ID Functions... 3 User / Group Enumeration... 3 Using LDAP Servers
Protect your brand from phishing emails by implementing DMARC 1
Protect your brand from phishing emails by implementing DMARC 1 Message from the Certified Senders Alliance supported by AOL, Microsoft and Google In the following article we want to clarify why marketers
Configuring Security for SMTP Traffic
4 Configuring Security for SMTP Traffic Securing SMTP traffic Creating a security profile for SMTP traffic Configuring a local traffic SMTP profile Assigning an SMTP security profile to a local traffic
Email setup information for most domains hosted with InfoRailway.
Email setup information for most domains hosted with InfoRailway. Incoming server (POP3): pop.secureserver.net port 995 (SSL) Incoming server (IMAP): imap.secureserver.net port 993 (SSL) Outgoing server
Implementing MDaemon as an Email Security Gateway to Exchange Server
Implementing MDaemon as an Email Security Gateway to Exchange Server Introduction MDaemon is widely deployed as a very effective antispam/antivirus gateway to Exchange. For optimum performance, we recommend
Internet Security [1] VU 184.216. Engin Kirda [email protected]
Internet Security [1] VU 184.216 Engin Kirda [email protected] Christopher Kruegel [email protected] Administration Challenge 2 deadline is tomorrow 177 correct solutions Challenge 4 will
NETASQ ACTIVE DIRECTORY INTEGRATION
NETASQ ACTIVE DIRECTORY INTEGRATION NETASQ ACTIVE DIRECTORY INTEGRATION RUNNING THE DIRECTORY CONFIGURATION WIZARD 2 VALIDATING LDAP CONNECTION 5 AUTHENTICATION SETTINGS 6 User authentication 6 Kerberos
Panda Cloud Email Protection
Panda Cloud Email Protection 1. Introduction a) What is spam? Spam is the term used to describe unsolicited messages or messages sent from unknown senders. They are usually sent in large (even massive)
MailGuard and Microsoft Exchange 2007
MailGuard and Microsoft Exchange 2007 Contents: Introduction - The purpose of this document. Protecting OUTBOUND email - Send your outbound email through MailGuard. MailGuard and Sender Policy Framework
User Identification (User-ID) Tips and Best Practices
User Identification (User-ID) Tips and Best Practices Nick Piagentini Palo Alto Networks www.paloaltonetworks.com Table of Contents PAN-OS 4.0 User ID Functions... 3 User / Group Enumeration... 3 Using
Basic Security Considerations for Email and Web Browsing
Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable
Email Services Deployment. Administrator Guide
Email Services Deployment Administrator Guide Email Services Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the
Quickstart guide to Configuring WebTitan
Quickstart guide to Configuring WebTitan 1. Install the License Once you have received the evaluation license by e-mail, you log on to WebTitan as follows using a browser as admin/hiadmin. Then navigate
How to Recognize Phishing Emails Targeting the University of Mary
How to Recognize Phishing Emails Targeting the University of Mary For the past several years, University of Mary has been targeted by phishing emails. It is important that you recognize these scams so
Configuring User Identification via Active Directory
Configuring User Identification via Active Directory Version 1.0 PAN-OS 5.0.1 Johan Loos [email protected] User Identification Overview User Identification allows you to create security policies based
How to set up a multifunction device or application to send email using Office 365
How to set up a multifunction device or application to send email using Office 365 Exchange Online 232 out of 424 rated this helpful Applies to: Exchange Online Topic Last Modified: 2015 10 14 You can
CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks Date: 16/05-2007
CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks Date: 16/05-2007 Written by Dennis Rand [email protected] http://www.csis.dk Table of contents Table of contents...
Trend Micro Hosted Email Security. Best Practice Guide
Trend Micro Hosted Email Security Best Practice Guide Hosted Email Security Best Practice Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described
Targeted attacks: Tools and techniques
Targeted attacks: Tools and techniques Performing «red-team» penetration tests Lessons learned Presented on 17/03/2014 For JSSI OSSIR 2014 By Renaud Feil Agenda Objective: Present tools techniques that
Frequently Asked Questions
Frequently Asked Questions Table of Contents DNS Settings... 3 MX record... 3 SPF record... 3 Configuring Outbound... 3 Smart host configuration for Exchange 2003... 3 Smart host configuration for Exchange
Domains Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc.
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Domains All Domains System administrators can use this section
How to Configure Captive Portal
How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,
1 Outlook Web Access. 1.1 Outlook Web Access (OWA) Foundation IT Written approximately Dec 2010
Foundation IT Written approximately Dec 2010 1 Outlook Web Access With the new version of Exchange 2010 Outlook Anywhere has been enabled and configured with a secure socket layer (SSL) certificate from
How To Secure A Website With A Password Protected Login Process (Www.Siphone)
Preventing Spoofing, Phishing and Spamming by Secure Usability and Cryptography ICDCS 07/07/2006 Amir Herzberg Computer Science Department, Bar Ilan University http://amirherzberg.com 04/05/06 http://amirherzberg.com
Targeted attacks begin with spearphishing
Targeted attacks begin with spearphishing Jasper Evertzen [email protected] Sales Director Benelux & Nordics Charles Rami [email protected] SE Manager France Benelux& Nordics threat protection
Phishing by data URI
Phishing by data URI Henning Klevjer [email protected] October 22, 2012 1 Abstract Historically, phishing web pages have been hosted by web servers that are either compromised or owned by the attacker.
A D M I N I S T R A T O R V 1. 0
A D M I N I S T R A T O R F A Q V 1. 0 2011 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA
What is a Mail Gateway?... 1 Mail Gateway Setup... 2. Peering... 3 Domain Forwarding... 4 External Address Verification... 4
Contents CHAPTER 1 IMail Secure Server as a Mail Gateway What is a Mail Gateway?... 1 Mail Gateway Setup... 2 CHAPTER 2 Possible Mail Gateway Configurations Peering... 3 Domain Forwarding... 4 External
SonicWALL Email Security Quick Start Guide. Version 4.6
SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more
Cloud Director User's Guide
Cloud Director 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing
EMAIL MARKETING SCORECARD Find Out How Much You Are Really Getting Out of Your Email Marketing This guide is designed to help you self-assess your email sending activities. There are two ways to render
How To Ensure Your Email Is Delivered
Everything You Need to Know About Delivering Email through Your Web Application SECTION 1 The Most Important Fact about Email: Delivery is Never Guaranteed Email is the backbone of the social web, making
Advanced Mail Server Settings Options for Shared Hosting Clients
Own Web Now Corp Advanced Mail Server Settings Options for Shared Hosting Clients The following document describes the more advanced mail server settings that are optional for shared hosting clients. These
WHITEPAPER. How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware
WHITEPAPER How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware How a DNS Firewall Helps in the Battle against Advanced As more and more information becomes available
WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8
WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8 Overview Global organizations are constantly battling with advanced persistent threats (APTs) and targeted attacks focused on extracting intellectual property
Configuration Guide for Exchange 2003, 2007 and 2010
Configuration Guide for Exchange 2003, 2007 and 2010 Table of Contents Exchange 2013... 2 Configuring Outbound Smart Host... 2 Configure Access Restriction to Prevent DoS Attacks... 2 Exchange 2007/2010...
Instructions Microsoft Outlook Express Page 1
Instructions Microsoft Outlook Express Page 1 Instructions Microsoft Outlook Express This manual is written for users who already have an e-mail account configured in Outlook Express and will therefore
To configure Outlook Express for your InfoMetrics E-mail address:
To configure Outlook Express for your InfoMetrics E-mail address: 1. Open Outlook Express 2. Click the Tools menu, and select Accounts... 3. Internet Accounts window will open, click Add and menu will
The anatomy of an online banking fraud
The anatomy of an online banking fraud or: Harvesting bank account data By Valentin Höbel. Mail to [email protected] (March2010) I. What this document is about II. Introduction III. The anatomy of an
SPAM FILTER Service Data Sheet
Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic
OKPAY guides. Security Guide
Название раздела OKPAY guides www.okpay.com Security Guide 2012 Contents SECURITY GUIDE Contents Introduction 1. OKPAY Security Overview 2. Security Tips 3. Security Center 3.1. Basic Protection 3.2. Email
Kerberos and Single Sign On with HTTP
Kerberos and Single Sign On with HTTP Joe Orton Senior Software Engineer, Red Hat Overview Introduction The Problem Current Solutions Future Solutions Conclusion Introduction WebDAV: common complaint of
INinbox Start-up Pack
2 INspired Email Marketing This is what you should know about sending emails through INinbox and how to get started! Thanks for joining INinbox. choice. You ve made a great In front of you, you find the
SPEAR PHISHING UNDERSTANDING THE THREAT
SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
Email Setup and Emailing Reports & Data
Email Setup and Emailing Reports & Data SmoothPay provides a built-in, zero-configuration SecureMail service - so you don't need to configure anything to deliver payslips by email etc. - you can do this
Install and Configure Oracle Outlook Connector
Install and Configure Oracle Outlook Connector To install and configure Oracle Outlook Connector for Outlook to send and receive e-mail and to access your TechTime TM calendar, do the following. 1. Run
Steps to Safeguard Enterprise Email
Steps to Safeguard Enterprise Email Joel M Snyder Senior Partner Opus One, Inc. [email protected] Our Strategy: Peeling the Onion Looking below RFC2821 Things that happen at TCP/IP layer and below Looking
CS 164 Winter 2009 Term Project Writing an SMTP server and an SMTP client (Receiver-SMTP and Sender-SMTP) Due & Demo Date (Friday, March 13th)
CS 164 Winter 2009 Term Project Writing an SMTP server and an SMTP client (Receiver-SMTP and Sender-SMTP) Due & Demo Date (Friday, March 13th) YOUR ASSIGNMENT Your assignment is to write an SMTP (Simple
Apple Mail... 36 Outlook Web Access (OWA)... 38 Logging In... 38 Changing Passwords... 39 Mobile Devices... 40 Blackberry...
Contents Email Accounts... 3 Adding accounts... 3 Account Modifications... 6 Adding Aliases... 7 Primary E-mail Addresses... 10 Mailbox Quotas... 12 Removing accounts... 13 Mail Forwarding and Distribution
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview
Sophos Mobile Control as a Service Startup guide. Product version: 3.5
Sophos Mobile Control as a Service Startup guide Product version: 3.5 Document date: August 2013 Contents 1 About this guide...3 2 What are the key steps?...4 3 First login...5 4 Change your administrator
Firewall Design Principles Firewall Characteristics Types of Firewalls
Firewall Design Principles Firewall Characteristics Types of Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the basis for these slides. Fall 2008
McAfee Enterprise Mobility Management 11.0 Software
Installation Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK
Inspection of Encrypted HTTPS Traffic
Technical Note Inspection of Encrypted HTTPS Traffic StoneGate version 5.0 SSL/TLS Inspection T e c h n i c a l N o t e I n s p e c t i o n o f E n c r y p t e d H T T P S T r a f f i c 1 Table of Contents
A New Era. A New Edge. Phishing within your company
Phishing within your company Learning Objectives What is phishing and how to minimize its impact Obtain a basic understanding of how to use virtual machines Use BackTrack, a tool used by many security
Whose IP Is It Anyways: Tales of IP Reputation Failures
Whose IP Is It Anyways: Tales of IP Reputation Failures SESSION ID: SPO-T07 Michael Hamelin Lead X-Force Security Architect IBM Security Systems @HackerJoe What is reputation? 2 House banners tell a story
How We're Getting Creamed
ed Attacks How We're Getting Creamed By Ed Skoudis June 9, 2011 ed Attacks - 2011 Ed Skoudis 1 $ cut -f5 -d: /etc/passwd grep -i skoudis Ed Skoudis Started infosec career at Bellcore in 1996 working for
SME- Mail to SMS & MMS Gateway with NowSMS Quick Start Guide
SME- Mail to SMS & MMS Gateway with NowSMS Quick Start Guide One of the typical usage cases for NowSMS is as an E-Mail to SMS & MMS Gateway. E-Mail users can send an SMS or MMS message by sending an e-mail
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
How to configure your email client
How to configure your email client This guide will teach you how to set up your email client. In this guide we will cover both Outlook and Windows Live mail, which are two of the major email clients used
Hosted Microsoft Exchange Client Setup & Guide Book
Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows Mobile Phone ActiveSync setup & configuration Section 3 - Apple iphone
Opacus Outlook Addin v3.x User Guide
Opacus Outlook Addin v3.x User Guide Connecting to your SugarCRM Instance Before you can use the plugin you must first configure it to communicate with your SugarCRM instance. In order to configure the
FSOEP Web Banking & Fraud: Corporate Treasury Attacks
FSOEP Web Banking & Fraud: Corporate Treasury Attacks Your Presenters Who Are We? Tim Wainwright Managing Director Chris Salerno Senior Consultant Led 200+ penetration tests Mobile security specialist
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
Understanding SMTP authentication and securing your IBM Lotus Domino 8 server from spam
Understanding SMTP authentication and securing your IBM Lotus Domino 8 server from spam Shrikant Jamkhandi IBM Software Group Senior Software Engineer Pune, India September 2009 Copyright International
Articles Fighting SPAM in Lotus Domino
Page 1 of 5 Articles Fighting SPAM in Lotus Domino For many e-mail administrators these days, the number one complaint from the users and managers is unsolicited emails flooding the system, commonly called
Steps for Basic Configuration
1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.
This presentation explains how to integrate Microsoft Active Directory to enable LDAP authentication in the IBM InfoSphere Master Data Management
This presentation explains how to integrate Microsoft Active Directory to enable LDAP authentication in the IBM InfoSphere Master Data Management Collaboration Server. Before going into details, there
1 SIP Carriers. 1.1 Tele2. 1.1.1 Warnings. 1.1.2 Vendor Contact. 1.1.3 Versions Verified SIP Carrier status as of Jan 1, 2011. 1.1.
1 SIP Carriers 1.1 Tele2 1.1.1 Warnings Check the SIP 3 rd Party SIP Carrier Matrix for certification status, and supported features. More info about the SIP 3 rd Party SIP Carrier Matrix can be found
Installing GFI FAXmaker
UTH Installing GFI FAXmaker System Requirements Before you install GFI FAXmaker, please ensure that you meet all the following requirements. GFI FAXmaker FAX Server: A Windows 2000 or 2003 server machine
How users bypass your security!
How users bypass your security! IT Days Security issues 20 th November 2014 Tom Leclerc, Security Consultant SAGS - Security Audits and Governance Services, a Telindus Security department Classification:
Installation Guide For ChoiceMail Enterprise Edition
Installation Guide For ChoiceMail Enterprise Edition How to Install ChoiceMail Enterprise On A Server In Front Of Your Company Mail Server August, 2004 Version 2.6x Copyright DigiPortal Software, 2002-2004
Emailing from The E2 Shop System EMail address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password
Emailing from The E2 Shop System With recent releases of E2SS (at least 7.2.7.23), we will be allowing two protocols for EMail delivery. A new protocol for EMail delivery Simple Mail Transfer Protocol
Filtering Mail with Milter. David F. Skoll Roaring Penguin Software Inc.
Filtering Mail with Milter David F. Skoll Roaring Penguin Software Inc. Why filter mail? Overview Different filtering approaches Delivery agent (e.g. Procmail) Central filtering (Milter) Milter Architecture
Technology Services Group Procedures. IH Anywhere guide. 0 P a g e
VDI Pilot Technology Services Group Procedures IH Anywhere guide 0 P a g e Installation Disable Apple Security Table of Contents IH Anywhere for Apple OSX (MAC)... 2 1. Installation... 2 Disable Apple
Frequently Asked Questions. Frequently Asked Questions. 2013 SSLPost Page 1 of 31 [email protected]
Frequently Asked Questions 2013 SSLPost Page 1 of 31 [email protected] Table of Contents 1 What is SSLPost Cloud? 3 2 Why do I need SSLPost Cloud? 4 3 What do I need to use SSLPost Cloud? 5 4 Which Internet
Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA
Emerging Network Security Threats and what they mean for internal auditors December 11, 2013 John Gagne, CISSP, CISA 0 Objectives Emerging Risks Distributed Denial of Service (DDoS) Attacks Social Engineering
Anti-Phishing Best Practices for ISPs and Mailbox Providers
Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing
Email Quick Reference. Administrator Guide
Email Quick Reference Administrator Guide Email Services Quick Reference Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec
Installation Steps on Desktop Clients
Installation Steps on Desktop Clients Table of Contents TABLE OF CONTENTS... 2 INSTALLATION STEPS FOR APPLE MAC BOOK... 3 XGEN PLUS INSTALLATION STEPS ON IPAD... 7 XGEN PLUS INSTALLATION STEPS ON MICROSOFT
Sonian Getting Started Guide October 2008
Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using
Quick Start Guide Sendio Hosted
Sendio Email System Protection Appliance Quick Start Guide Sendio Hosted Sendio 6.x and 7.x Sendio, Inc. 4911 Birch St, Suite 150 Newport Beach, CA 92660 USA +1.949.274.4375 www.sendio.com QUICK START
