{"id":232,"date":"2021-02-26T16:01:42","date_gmt":"2021-02-26T16:01:42","guid":{"rendered":"https:\/\/cas.cybercop-training.ch\/?page_id=232"},"modified":"2021-05-31T14:24:39","modified_gmt":"2021-05-31T14:24:39","slug":"spfdkimdmarc","status":"publish","type":"page","link":"https:\/\/cas.cybercop-training.ch\/index.php\/spfdkimdmarc\/","title":{"rendered":"SPF,DKIM,DMARC"},"content":{"rendered":"<h2>1. Introduction<\/h2>\n<p>After you did learn more about <code>SPF<\/code>, <code>DKIM<\/code> and <code>DMARC<\/code> in theory, please analyze different e-mail log files and answer the following questions:<\/p>\n<ol>\n<li>Has opportunistic encryption being used?<\/li>\n<li>Is the smtp communication using spf protection?<\/li>\n<li>Is the smtp communication using dkim protection?<\/li>\n<li>Is the smtp communication using dmarc protection?<\/li>\n<\/ol>\n<h2>2. Answers<\/h2>\n<p>For a better mail header analyses I use the following Online tool: <a href=\"https:\/\/mha.azurewebsites.net\/\">https:\/\/mha.azurewebsites.net\/<\/a><\/p>\n<p>Opportunisitc encryption is being used. An inidicator for that is the <code>STARTTLS<\/code> we can see in the wireshark log:<br \/>\n<img decoding=\"async\" src=\"https:\/\/cas.cybercop-training.ch\/wp-content\/uploads\/2021\/02\/wireshark_1.png\" alt=\"\" \/><\/p>\n<h3>2.1 Mail from HSR to Compass<\/h3>\n<p><img decoding=\"async\" src=\"https:\/\/cas.cybercop-training.ch\/wp-content\/uploads\/2021\/02\/compass_header1.png\" alt=\"\" \/><\/p>\n<p>SMTP communication uses <code>SPF<\/code> protection: <b>yes<\/b><br \/>\n<code>dig -t txt compass-security.com +noall +anser<\/code><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cas.cybercop-training.ch\/wp-content\/uploads\/2021\/02\/compass_spf1.png\" alt=\"\" \/><\/p>\n<p>SMTP communication uses <code>DKIM<\/code> protection: <b>yes<\/b><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cas.cybercop-training.ch\/wp-content\/uploads\/2021\/02\/compass_header2.png\" alt=\"\" \/><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cas.cybercop-training.ch\/wp-content\/uploads\/2021\/02\/compass_header3.png\" alt=\"\" \/><\/p>\n<p>SMTP communication uses <code>DMARC<\/code> protection: <b>no<\/b><\/p>\n<p><code>dig -t txt _dmarc.compass-security.com +short<\/code><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cas.cybercop-training.ch\/wp-content\/uploads\/2021\/02\/compass_dmarcf1.png\" alt=\"\" \/><\/p>\n<h3>2.2 Mail from HL to Compass<\/h3>\n<p><img decoding=\"async\" src=\"https:\/\/cas.cybercop-training.ch\/wp-content\/uploads\/2021\/02\/hl_header1.png\" alt=\"\" \/><\/p>\n<p>SMTP communication uses <code>SPF<\/code> protection: <b>yes<\/b><\/p>\n<p>SMTP communication uses <code>DKIM<\/code> protection: <b>yes<\/b><br \/>\n<img decoding=\"async\" src=\"https:\/\/cas.cybercop-training.ch\/wp-content\/uploads\/2021\/02\/hl_header2.png\" alt=\"\" \/><\/p>\n<p>SMTP communnication uses <code>DMARC<\/code> protection: <b>no<\/b><\/p>\n<h3>2.3 Mail from gmail to Compass<\/h3>\n<p><img decoding=\"async\" src=\"https:\/\/cas.cybercop-training.ch\/wp-content\/uploads\/2021\/02\/gmail_header1.png\" alt=\"\" \/><\/p>\n<p>SMTP communication uses <code>SPF<\/code> protection: <b>yes<\/b><\/p>\n<p>SMTP communication uses <code>DKIM<\/code> protection: <b>yes<\/b><br \/>\n<img decoding=\"async\" src=\"https:\/\/cas.cybercop-training.ch\/wp-content\/uploads\/2021\/02\/gmail_header2.png\" alt=\"\" \/><\/p>\n<p>SMTP communnication uses <code>DMARC<\/code> protection:<b>no<\/b><\/p>\n<h3>2.4 Mail from compass to hsr<\/h3>\n<p><img decoding=\"async\" src=\"https:\/\/cas.cybercop-training.ch\/wp-content\/uploads\/2021\/02\/compass_hsr1.png\" alt=\"\" \/><br \/>\nSMTP communication uses <code>SPF<\/code> protection: <b>yes<\/b><br \/>\n<img decoding=\"async\" src=\"https:\/\/cas.cybercop-training.ch\/wp-content\/uploads\/2021\/02\/compass_hsr2.png\" alt=\"\" \/><\/p>\n<p>SMTP Communication uses <code>DKIM<\/code> protection: <b>no<\/b> (No DKIM signature?)<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cas.cybercop-training.ch\/wp-content\/uploads\/2021\/02\/compass_hsr3.png\" alt=\"\" \/><\/p>\n<p>SMTP Communication uses <code>DMARC<\/code> protection: <b>no<\/b><\/p>\n<h2>3. Summary<\/h2>\n<table>\n<thead>\n<tr>\n<th>Sender<\/th>\n<th style=\"text-align: center;\">Recipient<\/th>\n<th style=\"text-align: left;\">SSL protection between sender and receiver<\/th>\n<th>DKIM enabled<\/th>\n<th>SPF enabled<\/th>\n<th>DMARC enabled<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Compass Security<\/td>\n<td style=\"text-align: center;\">HSR<\/td>\n<td style=\"text-align: left;\">yes<\/td>\n<td>no<\/td>\n<td>yes<\/td>\n<td>no<\/td>\n<\/tr>\n<tr>\n<td>GMAIL<\/td>\n<td style=\"text-align: center;\">Compass Security<\/td>\n<td style=\"text-align: left;\">yes<\/td>\n<td>yes<\/td>\n<td>yes<\/td>\n<td>yes<\/td>\n<\/tr>\n<tr>\n<td>Hackinglab<\/td>\n<td style=\"text-align: center;\">Compass Security<\/td>\n<td style=\"text-align: left;\">no<\/td>\n<td>yes<\/td>\n<td>yes<\/td>\n<td>yes<\/td>\n<\/tr>\n<tr>\n<td>HSR<\/td>\n<td style=\"text-align: center;\">Compass Security<\/td>\n<td style=\"text-align: left;\">yes<\/td>\n<td>yes<\/td>\n<td>yes<\/td>\n<td>no<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>PDF Report:<br \/>\n<a href=\"https:\/\/cas.cybercop-training.ch\/wp-content\/uploads\/2021\/02\/spam_protection2.pdf\" class=\"mtli_attachment mtli_pdf\" title=\"spam_protection#2\">spam_protection#2<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>1. Introduction After you did learn more about SPF, DKIM and DMARC in theory, please analyze different e-mail log files and answer the following questions: Has opportunistic encryption being used? Is the smtp communication using spf protection? Is the smtp communication using dkim protection? Is the smtp communication using dmarc protection? 2. Answers For a [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-232","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cas.cybercop-training.ch\/index.php\/wp-json\/wp\/v2\/pages\/232","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cas.cybercop-training.ch\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cas.cybercop-training.ch\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cas.cybercop-training.ch\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cas.cybercop-training.ch\/index.php\/wp-json\/wp\/v2\/comments?post=232"}],"version-history":[{"count":4,"href":"https:\/\/cas.cybercop-training.ch\/index.php\/wp-json\/wp\/v2\/pages\/232\/revisions"}],"predecessor-version":[{"id":1351,"href":"https:\/\/cas.cybercop-training.ch\/index.php\/wp-json\/wp\/v2\/pages\/232\/revisions\/1351"}],"wp:attachment":[{"href":"https:\/\/cas.cybercop-training.ch\/index.php\/wp-json\/wp\/v2\/media?parent=232"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}