You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Sep 2, 2021. It is now read-only.
An attacker can easily generate lots of entries with random local parts, all from 1 or a few sending domains (sometimes using SparkPost to do it). To detect that here's a summary of domains used by entrant frequency:
selectcount(*) as cnt, substring(smtp_from, position('@'in smtp_from)) as domain from relay_messages where smtp_to like'rafflename@%'group by domain havingcount(*) >1;
Mutating Local Part
An attacker might manage multiple domains but use similar local parts across them. Here's a summary of those:
selectcount(*) as cnt, substring(smtp_from, 0, position('@'in smtp_from)) as localpart from relay_messages where smtp_to like'rafflename@%'group by localpart havingcount(*) >1;
The text was updated successfully, but these errors were encountered:
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Abuse Of A Personal Domain
An attacker can easily generate lots of entries with random local parts, all from 1 or a few sending domains (sometimes using SparkPost to do it). To detect that here's a summary of domains used by entrant frequency:
Mutating Local Part
An attacker might manage multiple domains but use similar local parts across them. Here's a summary of those:
The text was updated successfully, but these errors were encountered: