You Have No Idea Who Sent That Email - 18 Attacks on Email Sender Authentication
Offered By: Black Hat via YouTube
Course Description
Overview
Explore 18 types of attacks that bypass email sender authentication in this 40-minute Black Hat conference talk. Delve into vulnerabilities affecting popular email providers and clients, including techniques to impersonate senders and forge DKIM-signed emails. Learn about inconsistencies in SPF, DKIM, and DMARC protocols, and understand the complexities of email transmission and authentication flows. Discover how attackers exploit parsing inconsistencies, inject authentication results, and leverage email service accounts for spoofing. Gain insights into potential defense strategies against these sophisticated email security threats.
Syllabus
Intro
How Do You Verify the Email Sender?
Background: Email Transmission
Sender Policy Framework (SPF)
Domain Message Authentication, Reporting and Conformance (MARC)
Overview of Email Authentication Flow
Key Idea of Our Attacks
Inconsistencies b/w SPF and DMARC
Inconsistencies b/w DKIM and DNS
Exp. 3a: DKIM Authentication Results Injection
a: Multiple From Headers
From Sender Ambiguity
Complex From Header Syntax
h: Exploiting Parsing Inconsistencies
Spoofing via an Email Service Account
Thinking on Defense
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube