mirror of
https://github.com/mgeeky/Penetration-Testing-Tools.git
synced 2025-02-24 03:51:16 +01:00
update
This commit is contained in:
parent
008f2ec160
commit
6b89dcda24
@ -9,15 +9,24 @@ Resulting output will contain useful information on why this e-mail might have b
|
||||
|
||||
### Example screenshots
|
||||
|
||||
- Chain of MTA servers (nicely parsed `Received` headers):
|
||||
|
||||

|
||||
|
||||
- Various headers decoded as much as possible, according to publicly available documentation (here _Office365 ForeFront Spam Report_):
|
||||
|
||||

|
||||
|
||||
- Different custom heuristics implement to actively validate and seek for clues of spam categorization, here logic detecting _Domain Impersonation_:
|
||||
|
||||

|
||||
|
||||
- Script attempts to reverse-engineer and document some of the Office365 Anti-Spam rules, as well as collect public knowledge about other opaque Anti-Spam headers:
|
||||
|
||||

|
||||
|
||||
|
||||
|
||||
### Processed headers
|
||||
|
||||
Processed headers (more than **67+** headers are parsed):
|
||||
|
Loading…
Reference in New Issue
Block a user