Sponsored Content
Top Forums UNIX for Dummies Questions & Answers Spoofing a From Address in SMTP Post 302171307 by manikantants on Thursday 28th of February 2008 05:48:58 AM
Old 02-28-2008
In solaris we have got an option '-r' , with mailx, for this purpose.
As per my knoledge it is not available in Linux not sure about other falours.
 

8 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Spoofing paths.

There is a program that I am trying to run on a shell account. It depends on another program, which I have also copied to the shell account. Both are in my home directory, yet the first program has a different path hardcoded into it, which I cannot use because of permissions problems. How can I... (3 Replies)
Discussion started by: fahadsadah
3 Replies

2. Cybersecurity

Help Make a spoofing DNS using pcap library

Hello all, i need your quick help. I have assignment project class to make a program using pcap library to spoofing DNS in linux environment. Can anyone help me, because i'm newbie in network security and in C?:confused: Regards, ptrfw (1 Reply)
Discussion started by: riska_bali
1 Replies

3. Cybersecurity

MAC Address spoofing

There is a question in the SCO section asking for information on how to change the MAC address of a NIC. Is there a valid reason for wanting to change the MAC address? (1 Reply)
Discussion started by: jgt
1 Replies

4. Solaris

MAC spoofing a virtual NIC on Solaris 5.0

Hi everybody! I'm facing a problem and I doubt about the solution (I'm not very familiar with old *NIXs). An external network supplier (let's call them "telco") just installed new communication components that filters MAC addresses. I have a Solaris 5 server, with 1 NIC (hte0) which is... (6 Replies)
Discussion started by: Isharfoxat
6 Replies

5. OS X (Apple)

ethernet mac spoofing

I tried to use the command sudo ifconfig en0 ether xx:xx:xx:xx:xx:xx to do mac spoofing for internet connection in my office. It works only for 5 minutes. Every time after about 5mins, the Internet will be disconnected. :wall: Any one knows how to solve this problem? Thanks. (6 Replies)
Discussion started by: andrewust
6 Replies

6. IP Networking

Protection against arp spoofing

Hi, I'm trying to find a way to protect my network against arp spoofing. What it is: An attacker sends fake arp packets in the network, identifying himself as the router. All network traffic is then redirected to this attacker. How to protect myself: In my opinion, the best possible... (2 Replies)
Discussion started by: chrisperry
2 Replies

7. Solaris

SMTP relay one (1) hostname with two (2) IP Address

Hi, Anyone can help? Currently : I'm am using a smtp smart relay, 1 hostname but different IP Address 192.168.2.108 and 192.168.2.109). I'm using "smtp.mailhostname.com mailhost" and having an IP Address 192.168.2.108, but there is a certain minutes/seconds that the IP Address will... (2 Replies)
Discussion started by: fspalero
2 Replies

8. UNIX for Dummies Questions & Answers

Running into problems while spoofing IP Address

I have a machine (IP:192.168.1.185) and i want to send spoofed IP address (e.g. 192.168.1.212) to another machine(192.168.1.213) . I am using a spoofing program for this which uses raw sockets. Now whenever i pass the parameters(spoofed ip addr and destination) to the output of the program, i... (2 Replies)
Discussion started by: syncmaster
2 Replies
auth-relaytest(1)					      General Commands Manual						 auth-relaytest(1)

NAME
auth-relaytest - attempt to use authenticated SMTP to relay to a DSBL-compliant host SYNOPSIS
auth-relaytest [-tv] ntlm <ip address[:port]> auth-relaytest [-tv] (cram-md5|login) <username> <password> <ip address[:port]> DESCRIPTION
auth-relaytest attempts to connect to the specified <ip address> on the specified port (default is port 25) and tries to use the supplied authentication data to relay mail through the host. auth-relaytest uses the sender_user, sender_domain, target_user, target_domain, and auth-message parameters from dsbl.conf(5) by default. If the auth-message parameter is not present, the message parameter is used instead. In the first mode of operation shown, auth-relaytest attempts to authenticate using anonymous NTLM authentication. A well-known bug in cer- tain Microsoft SMTP server implementations (described at http://www.microsoft.com/technet/security/bulletin/MS02-011.asp) will allow relay- ing for any client that authenticates in this way. In the second form of operation, auth-relaytest attempts to authenticate using either the cram-md5 or login variant of SMTP AUTH, using the supplied username and password. OPTIONS
-t Test mode. Instead of using the target_domain parameter from dsbl.conf(5), the test_target_domain parameter is used instead. This is useful for sending a test message to yourself, perhaps to check that the server is actually relaying the messages. -v Verbose mode. Details of the SMTP transaction are written to standard output. AUTHORS
Paul Howarth <paul@city-fan.org> Ian Gulliver <ian@penguinhosting.net> SEE ALSO
dsbl.conf(5), spamtrap(1), relaytest(1) 2004-01-06 auth-relaytest(1)
All times are GMT -4. The time now is 10:11 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy