The SMTP Protocol Fundamentals




 

 

Review

In this book you will find the necessary information to understand the creation, transmission and processing of any mail using the SMTP protocol. The book contains information of several offical protocol standards, the necessary components for a successful mail flow and updated information on how to protect your Organization against the most common attacks.

This book is the perfect reference material for mail administrators, security administrators, infrastructure/software architects or designers and any other person that intends to study the use and composition of e-mail under several platforms.

Along the different sections included, you will find practical excersices that will help you to reafirm what you have learned as your reading continues. You will also find explanations to real life situations like the SMTP error codes, how to manually send a mail no matter if it is in plain text or MIME format with attachments, etc. This will help you understand different scenarios, security holes and vulnerabilities in the SMTP protocol and how to handle them.

Cada concepto es explicado en profundidad para que incluso alguien con poco o nulo conocimiento previo sobre SMTP pueda terminar la lectura sabiendo aplicar lo aprendido en un ambiente real.

 

Content

Format: eBook (PDF)
Cost: USD$ 12.00
Number of Pages: 131

 Table of Contents

I. Introduction to Email
   I.1 Email and Standards
   I.2. Email flow components
   I.3 Email Threat Landscape
      I.3.1 SPAM
      I.3.2 DHA
      I.3.3 Malware
      I.3.4 Bounced Mail
      I.3.5 Spoofing
   I.4 Summary
II. The SMTP Structure
   II.1 The SMTP Standards
      II.1.1. RFC 821
      II.1.2. RFC 2821
      II.1.3. RFC 5321
   II.2 Email Structure
      II.2.1 Handshake
      II.2.2 Envelope
          II.2.2.1. SIZE
         II.2.2.2. DSN-RCPT-NOTIFY
         II.2.2.3. DSN-RCPT-ORCPT
         II.2.2.4. DSN-MAIL-RET
         II.2.2.5. DSN-MAIL-ENVID
         II.2.2.6. MDN
      II.2.3 Headers
         II.2.3.1. General rules for Headers
         II.2.3.2. Date and time Headers
         II.2.3.3. Origin Headers
         II.2.3.4. Destination Headers
         II.2.3.5. Identification Headers
         II.2.3.6. Information Headers
         II.2.3.7. Tracing Headers
         II.2.3.8. Optional Headers
         II.2.3.9. MIME Headers
      II.2.4 Body
         II.2.4.1. Simple Body
         II.2.4.2. Alternate Body
      II.2.5 Attachments
         II.2.5.1. Multipart/mixed
         II.2.5.2. Multipart/Digest
      II.2.6 Reply/Error codes
         II.2.6.1. Main Status Codes
         II.2.6.2. Extended Status Codes
   II.3 Native SMTP Vulnerabilities
      II.3.1 Envelope Vulnerabilities
         II.3.1.1. Initial connection and the HELO/EHLO command
         II.3.1.2. MAIL
         II.3.1.3. RCPT
      II.3.2 Header Vulnerabilities
         II.3.2.1. Automatic Notifications
         II.3.2.2. Content mismatch
         II.3.2.3. File formats mismatch
         II.3.2.4. Spoofing
      II.3.3 Body and Attachments Vulnerabilities
         II.3.3.1. SPAM
         II.3.3.2. Content
         II.3.3.3. Malware
   II.4. Summary
 References

 




As always, the RedinSkala team is very thankfull of thankful of your support as this is the engine we use to cover our operational costs, so don’t forget to visit our Book section for the latest publications.

 

Comments and Suggestions:

mail: rskala@redinskala.com
twitter: @redinskala