Use Telnet to counterfeit any message

Source: Internet
Author: User

At work, you may often have some requirements to test your mail system, especially for anonymous mail. In fact, the anonymous mail feature is still common in today's Exchange messaging system.

In particular, enterprises have their own development of some systems, need to use the mail function, usually to find the enterprise internal SMTP server to do the connection, and then through the anonymous mail function, send notifications and alarm messages.

Let's talk about a simple way to test how anonymous mail is turned on today.

First of all, we have to turn on anonymous mail in the ECP, or some of them are useless.

Open the ECP, in the Receive connector, on the Security tab, check Enable anonymous mail feature.

650) this.width=650; "height=" 462 "title=" image "style=" border:0px; "alt=" image "src=" http://s3.51cto.com/wyfs02/M00 /89/3c/wkiol1gnsaoyvfahaadxd8wuhke808.png "border=" 0 "/>

Then the following will start the test with Telnet.

In fact, the way we test is very simple, mainly to simulate a lot of counterfeit mail, to see if the normal business users can receive this email.

First of all, your PC has to install the Telnet client component, which is not much to say.

650) this.width=650; "height=" 422 "title=" image "style=" border:0px; "alt=" image "src=" http://s3.51cto.com/wyfs02/M01 /89/3e/wkiom1gnsasrwgtmaabanh1kxg0330.png "border=" 0 "/>

Then we will start to counterfeit mail!!!

1. Open cmd Command Line window

650) this.width=650; "height=" "title=" image "style=" border:0px; "alt=" image "src=" http://s3.51cto.com/wyfs02/M02 /89/3e/wkiom1gnsass5b6faaatnxflnze555.png "border=" 0 "/>

2. Then, just like the Telnet port, enter Telnet mail.xxx.com 25

650) this.width=650; "height=" 205 "title=" image "style=" border:0px; "alt=" image "src=" http://s3.51cto.com/wyfs02/M01 /89/3e/wkiom1gnsawbhwx6aabtmm4ufss090.png "border=" 0 "/>

650) this.width=650; "height=" 161 "title=" image "style=" border:0px; "alt=" image "src=" http://s3.51cto.com/wyfs02/M02 /89/3c/wkiol1gnsaxcgjetaaa5v5gy8ho633.png "border=" 0 "/>

3. Enter EHLO mail.xxx.com

650) this.width=650; "height=" 327 "title=" image "style=" border:0px; "alt=" image "src=" http://s3.51cto.com/wyfs02/M00 /89/3c/wkiol1gnsaagykqpaaddx63azxg856.png "border=" 0 "/>

4. Enter mail from: [email protected] (the following email address is the "phishing address" you want)

650) this.width=650; "height=" 359 "title=" image "style=" border:0px; "alt=" image "src=" http://s3.51cto.com/wyfs02/M02 /89/3e/wkiom1gnsafht7cpaaaxyvtpqr0677.png "border=" 0 "/>

The system returns you a sender OK message.

5. Enter RCPT To:[email protected] Enter the recipient's email address here

650) this.width=650; "height=" "title=" image "style=" border:0px; "alt=" image "src=" http://s3.51cto.com/wyfs02/M00 /89/3e/wkiom1gnsaeb-yqqaaa1eas6hjq993.png "border=" 0 "/>

6. Enter data and you will get the following information.

650) this.width=650; "height=" 398 "title=" image "style=" border:0px; "alt=" image "src=" http://s3.51cto.com/wyfs02/M01 /89/3c/wkiol1gnsajcdsptaaa4-vux204783.png "border=" 0 "/>

7. Enter the title Subject:test, then return

8. Then press ENTER again, because the Telnet command line requires a blank space between the subject and the body.

9. Enter body content This is a test mail, and then two times enter

10. Finally enter a "." Symbol, carriage return

650) this.width=650; "height=" 485 "title=" image "style=" border:0px; "alt=" image "src=" http://s3.51cto.com/wyfs02/M01 /89/3c/wkiol1gnsajctwfraabri_c7wlk979.png "border=" 0 "/>

Finally, the system sends you a send rate and file size as well as a receipt for the destination server.

Next we can see that we have received this "counterfeit" mail.

650) this.width=650; "height=" 448 "title=" image "style=" border:0px; "alt=" image "src=" http://s3.51cto.com/wyfs02/M02 /89/3c/wkiol1gnsamirsjmaac0a8b0ydy801.png "border=" 0 "/>

This article is from the "June Ma Run Space" blog, be sure to keep this source http://horse87.blog.51cto.com/2633686/1864977

Use Telnet to counterfeit any message

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.