02-28-2008
In solaris we have got an option '-r' , with mailx, for this purpose.
As per my knoledge it is not available in Linux not sure about other falours.
8 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
There is a program that I am trying to run on a shell account. It depends on another program, which I have also copied to the shell account. Both are in my home directory, yet the first program has a different path hardcoded into it, which I cannot use because of permissions problems.
How can I... (3 Replies)
Discussion started by: fahadsadah
3 Replies
2. Cybersecurity
Hello all, i need your quick help. I have assignment project class to make a program using pcap library to spoofing DNS in linux environment. Can anyone help me, because i'm newbie in network security and in C?:confused:
Regards,
ptrfw (1 Reply)
Discussion started by: riska_bali
1 Replies
3. Cybersecurity
There is a question in the SCO section asking for information on how to change the MAC address of a NIC. Is there a valid reason for wanting to change the MAC address? (1 Reply)
Discussion started by: jgt
1 Replies
4. Solaris
Hi everybody!
I'm facing a problem and I doubt about the solution (I'm not very familiar with old *NIXs).
An external network supplier (let's call them "telco") just installed new communication components that filters MAC addresses.
I have a Solaris 5 server, with 1 NIC (hte0) which is... (6 Replies)
Discussion started by: Isharfoxat
6 Replies
5. OS X (Apple)
I tried to use the command
sudo ifconfig en0 ether xx:xx:xx:xx:xx:xx
to do mac spoofing for internet connection in my office. It works only for 5 minutes. Every time after about 5mins, the Internet will be disconnected. :wall:
Any one knows how to solve this problem? Thanks. (6 Replies)
Discussion started by: andrewust
6 Replies
6. IP Networking
Hi, I'm trying to find a way to protect my network against arp spoofing.
What it is:
An attacker sends fake arp packets in the network, identifying himself as the router. All network traffic is then redirected to this attacker.
How to protect myself:
In my opinion, the best possible... (2 Replies)
Discussion started by: chrisperry
2 Replies
7. Solaris
Hi,
Anyone can help?
Currently :
I'm am using a smtp smart relay, 1 hostname but different IP Address 192.168.2.108 and 192.168.2.109).
I'm using "smtp.mailhostname.com mailhost" and having an IP Address 192.168.2.108, but there is a certain minutes/seconds that the IP Address will... (2 Replies)
Discussion started by: fspalero
2 Replies
8. UNIX for Dummies Questions & Answers
I have a machine (IP:192.168.1.185) and i want to send spoofed IP address (e.g. 192.168.1.212) to another machine(192.168.1.213) . I am using a spoofing program for this which uses raw sockets.
Now whenever i pass the parameters(spoofed ip addr and destination) to the output of the program, i... (2 Replies)
Discussion started by: syncmaster
2 Replies
LEARN ABOUT DEBIAN
auth-relaytest
auth-relaytest(1) General Commands Manual auth-relaytest(1)
NAME
auth-relaytest - attempt to use authenticated SMTP to relay to a DSBL-compliant host
SYNOPSIS
auth-relaytest [-tv] ntlm <ip address[:port]>
auth-relaytest [-tv] (cram-md5|login) <username> <password> <ip address[:port]>
DESCRIPTION
auth-relaytest attempts to connect to the specified <ip address> on the specified port (default is port 25) and tries to use the supplied
authentication data to relay mail through the host.
auth-relaytest uses the sender_user, sender_domain, target_user, target_domain, and auth-message parameters from dsbl.conf(5) by default.
If the auth-message parameter is not present, the message parameter is used instead.
In the first mode of operation shown, auth-relaytest attempts to authenticate using anonymous NTLM authentication. A well-known bug in cer-
tain Microsoft SMTP server implementations (described at http://www.microsoft.com/technet/security/bulletin/MS02-011.asp) will allow relay-
ing for any client that authenticates in this way.
In the second form of operation, auth-relaytest attempts to authenticate using either the cram-md5 or login variant of SMTP AUTH, using the
supplied username and password.
OPTIONS
-t Test mode. Instead of using the target_domain parameter from dsbl.conf(5), the test_target_domain parameter is used instead. This is
useful for sending a test message to yourself, perhaps to check that the server is actually relaying the messages.
-v Verbose mode. Details of the SMTP transaction are written to standard output.
AUTHORS
Paul Howarth <paul@city-fan.org>
Ian Gulliver <ian@penguinhosting.net>
SEE ALSO
dsbl.conf(5), spamtrap(1), relaytest(1)
2004-01-06 auth-relaytest(1)