update
This commit is contained in:
parent
008f2ec160
commit
6b89dcda24
|
@ -9,15 +9,24 @@ Resulting output will contain useful information on why this e-mail might have b
|
||||||
|
|
||||||
### Example screenshots
|
### Example screenshots
|
||||||
|
|
||||||
|
- Chain of MTA servers (nicely parsed `Received` headers):
|
||||||
|
|
||||||
![1.png](img/1.png)
|
![1.png](img/1.png)
|
||||||
|
|
||||||
|
- Various headers decoded as much as possible, according to publicly available documentation (here _Office365 ForeFront Spam Report_):
|
||||||
|
|
||||||
![2.png](img/2.png)
|
![2.png](img/2.png)
|
||||||
|
|
||||||
|
- Different custom heuristics implement to actively validate and seek for clues of spam categorization, here logic detecting _Domain Impersonation_:
|
||||||
|
|
||||||
![3.png](img/3.png)
|
![3.png](img/3.png)
|
||||||
|
|
||||||
|
- Script attempts to reverse-engineer and document some of the Office365 Anti-Spam rules, as well as collect public knowledge about other opaque Anti-Spam headers:
|
||||||
|
|
||||||
![4.png](img/4.png)
|
![4.png](img/4.png)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### Processed headers
|
### Processed headers
|
||||||
|
|
||||||
Processed headers (more than **67+** headers are parsed):
|
Processed headers (more than **67+** headers are parsed):
|
||||||
|
|
Loading…
Reference in New Issue