At work, you may often have some requirements to test your mail system, especially for anonymous mail. In fact, the anonymous mail feature is still common in today's Exchange messaging system.
In particular, enterprises have their own development of some systems, need to use the mail function, usually to find the enterprise internal SMTP server to do the connection, and then through the anonymous mail function, send notifications and alarm messages.
Let's talk about a simple way to test how anonymous mail is turned on today.
First of all, we have to turn on anonymous mail in the ECP, or some of them are useless.
Open the ECP, in the Receive connector, on the Security tab, check Enable anonymous mail feature.
650) this.width=650; "height=" 462 "title=" image "style=" border:0px; "alt=" image "src=" http://s3.51cto.com/wyfs02/M00 /89/3c/wkiol1gnsaoyvfahaadxd8wuhke808.png "border=" 0 "/>
Then the following will start the test with Telnet.
In fact, the way we test is very simple, mainly to simulate a lot of counterfeit mail, to see if the normal business users can receive this email.
First of all, your PC has to install the Telnet client component, which is not much to say.
650) this.width=650; "height=" 422 "title=" image "style=" border:0px; "alt=" image "src=" http://s3.51cto.com/wyfs02/M01 /89/3e/wkiom1gnsasrwgtmaabanh1kxg0330.png "border=" 0 "/>
Then we will start to counterfeit mail!!!
1. Open cmd Command Line window
650) this.width=650; "height=" "title=" image "style=" border:0px; "alt=" image "src=" http://s3.51cto.com/wyfs02/M02 /89/3e/wkiom1gnsass5b6faaatnxflnze555.png "border=" 0 "/>
2. Then, just like the Telnet port, enter Telnet mail.xxx.com 25
650) this.width=650; "height=" 205 "title=" image "style=" border:0px; "alt=" image "src=" http://s3.51cto.com/wyfs02/M01 /89/3e/wkiom1gnsawbhwx6aabtmm4ufss090.png "border=" 0 "/>
650) this.width=650; "height=" 161 "title=" image "style=" border:0px; "alt=" image "src=" http://s3.51cto.com/wyfs02/M02 /89/3c/wkiol1gnsaxcgjetaaa5v5gy8ho633.png "border=" 0 "/>
3. Enter EHLO mail.xxx.com
650) this.width=650; "height=" 327 "title=" image "style=" border:0px; "alt=" image "src=" http://s3.51cto.com/wyfs02/M00 /89/3c/wkiol1gnsaagykqpaaddx63azxg856.png "border=" 0 "/>
4. Enter mail from: [email protected] (the following email address is the "phishing address" you want)
650) this.width=650; "height=" 359 "title=" image "style=" border:0px; "alt=" image "src=" http://s3.51cto.com/wyfs02/M02 /89/3e/wkiom1gnsafht7cpaaaxyvtpqr0677.png "border=" 0 "/>
The system returns you a sender OK message.
5. Enter RCPT To:[email protected] Enter the recipient's email address here
650) this.width=650; "height=" "title=" image "style=" border:0px; "alt=" image "src=" http://s3.51cto.com/wyfs02/M00 /89/3e/wkiom1gnsaeb-yqqaaa1eas6hjq993.png "border=" 0 "/>
6. Enter data and you will get the following information.
650) this.width=650; "height=" 398 "title=" image "style=" border:0px; "alt=" image "src=" http://s3.51cto.com/wyfs02/M01 /89/3c/wkiol1gnsajcdsptaaa4-vux204783.png "border=" 0 "/>
7. Enter the title Subject:test, then return
8. Then press ENTER again, because the Telnet command line requires a blank space between the subject and the body.
9. Enter body content This is a test mail, and then two times enter
10. Finally enter a "." Symbol, carriage return
650) this.width=650; "height=" 485 "title=" image "style=" border:0px; "alt=" image "src=" http://s3.51cto.com/wyfs02/M01 /89/3c/wkiol1gnsajctwfraabri_c7wlk979.png "border=" 0 "/>
Finally, the system sends you a send rate and file size as well as a receipt for the destination server.
Next we can see that we have received this "counterfeit" mail.
650) this.width=650; "height=" 448 "title=" image "style=" border:0px; "alt=" image "src=" http://s3.51cto.com/wyfs02/M02 /89/3c/wkiol1gnsamirsjmaac0a8b0ydy801.png "border=" 0 "/>
This article is from the "June Ma Run Space" blog, be sure to keep this source http://horse87.blog.51cto.com/2633686/1864977
Use Telnet to counterfeit any message