mirror of
https://github.com/mgeeky/Penetration-Testing-Tools.git
synced 2025-04-07 10:14:08 +02:00
update
This commit is contained in:
parent
008f2ec160
commit
6b89dcda24
@ -9,15 +9,24 @@ Resulting output will contain useful information on why this e-mail might have b
|
|||||||
|
|
||||||
### Example screenshots
|
### Example screenshots
|
||||||
|
|
||||||
|
- Chain of MTA servers (nicely parsed `Received` headers):
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
- Various headers decoded as much as possible, according to publicly available documentation (here _Office365 ForeFront Spam Report_):
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
- Different custom heuristics implement to actively validate and seek for clues of spam categorization, here logic detecting _Domain Impersonation_:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
- Script attempts to reverse-engineer and document some of the Office365 Anti-Spam rules, as well as collect public knowledge about other opaque Anti-Spam headers:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### Processed headers
|
### Processed headers
|
||||||
|
|
||||||
Processed headers (more than **67+** headers are parsed):
|
Processed headers (more than **67+** headers are parsed):
|
||||||
|
Loading…
x
Reference in New Issue
Block a user