User Enumeration

Popularity:

8

Simplicity:

3

Impact:

3

Risk Rating:

5

Reconnaissance and user enumeration will always be one of the first steps in any attack, whether its final objective is a penetration test or SPAM campaign. Having all the intelligence available is vital to making the test, or attack, more effective.

Many spammers harvest email addresses from those pesky email forwards, especially if they come from sites like Hotmail where the default is to post the whole email (including the header with all of the email addresses) in the body of the forwarded message. Others look for clean addresses directly from a reliable source: a friendly email server with active or available EXPN and VRFY commands.

Was this article helpful?

0 0
The Ultimate Computer Repair Guide

The Ultimate Computer Repair Guide

Read how to maintain and repair any desktop and laptop computer. This Ebook has articles with photos and videos that show detailed step by step pc repair and maintenance procedures. There are many links to online videos that explain how you can build, maintain, speed up, clean, and repair your computer yourself. Put the money that you were going to pay the PC Tech in your own pocket.

Get My Free Ebook


Post a comment