课程: Threat Modeling: Spoofing In Depth

今天就学习课程吧!

今天就开通帐号,24,700 门业界名师课程任您挑!

Spoofing a specific person in email

Spoofing a specific person in email

- I've already talked in general about spoofing a person. Email is a common example. If I want to claim that my name is Little Red Riding Hood, I can go into my email client and just do this. Now, when I send email, it displays as Little Red Riding Hood and no one's the wiser, unless of course, their email program cleverly displays email addresses. That's not the best way of changing my identity. Anyone can see that my email is still [email protected]. So really, I should go and set up an entirely new email address and hey, [email protected] is already taken, that's weird. So I can just take [email protected] and now all good. Now, my email matches my name and that's helpful, but someone might look at the domain name. I can get a domain that looks like the one someone expects. Maybe RidingHoods.com? Each of these could be a real email address of one of the domains. The spoofing is happening at…

内容