随后我发现了一个 mbox 的文件,里面貌似是一封邮件信息: From root@dc-7 Thu Aug 29 17:00:22 2019 Return-path: <root@dc-7> Envelope-to of '/home/dc7user/backups/website.sql' failed: File exists From root@dc-7 Thu Aug 29 17:15:11 2019 Return-path of '/home/dc7user/backups/website.sql' failed: File exists From root@dc-7 Thu Aug 29 17:30:11 2019 Return-path of '/home/dc7user/backups/website.sql' failed: File exists From root@dc-7 Thu Aug 29 17:45:11 2019 Return-path of '/home/dc7user/backups/website.sql' failed: File exists From root@dc-7 Thu Aug 29 20:45:21 2019 Return-path
. ----------------------------------------- 正如我们所看到的,Wordpress为了生成重置邮件创建的一个From/Return-Path(发件人/收件人)头 例如attackers-mxserver.com 这将导致Wordpress的$from_email变为wordpress@attackers-mxserver.com,最终导致包含From/Return-Path action=rp&key=AceiMFmkMR4fsmwxIZtZ&login=admin%3E 正如我们看到的,Return-Path, From, 以及Message-ID字段都是攻击者控制的域
以下Python脚本演示如何提取并验证“Return-Path”与“From”字段的一致性:import emailfrom email.utils import parseaddrdef validate_sec_email = email.message_from_file(f)from_addr = parseaddr(msg.get('From'))[1].lower()return_path = msg.get('Return-Path sec.gov':print(f"[ALERT] 邮件声称来自 sec.gov,但实际发送域为: {real_domain}")print(f"发件人地址: {from_addr}")print(f"Return-Path Contact Email for Cybersecurity Audit合规专员小王注意到发件人地址异常,立即启动验证协议:查询SEC官网,确认CIO姓名为David Bottom(拼写正确);检查邮件头,发现Return-Path
&hvim0y 账户:charles jim@dc-4:/var/mail$ cat /var/mail/jim From charles@dc-4 Sat Apr 06 21:15:46 2019 Return-path Password is: ^xHhA&hvim0y See ya, Charles From MAILER-DAEMON Wed Jun 05 19:07:50 2024 Return-path: Final-Recipient: rfc822;dc4@dc-4 Status: 5.0.0 --1717578470-eximdsn-1804289383 Content-type: message/rfc822 Return-path ; COMMAND=/bin/su --1717578470-eximdsn-1804289383-- From MAILER-DAEMON Wed Jun 05 19:09:47 2024 Return-path Final-Recipient: rfc822;dc4@dc-4 Status: 5.0.0 --1717578587-eximdsn-1804289383 Content-type: message/rfc822 Return-path
Return-Path: <xiaochongyong@sam-server> X-Original-To: xiaochongyong@sam-server Delivered-To: xiaochongyong Return-Path: <MAILER-DAEMON> Received: from localhost (localhost) by xcy-virtual-machine (8.14.4/ Return-Path: <xcy@xcy-virtual-machine> Received: from xcy-virtual-machine (localhost [127.0.0.1])
Return-Path:指定邮件退回地址,通常与From一致。示例:Return-Path: <bounces@example.com>重要性:用于处理邮件投递失败。10. 查看Return-Path:如果与From不一致,可能用于隐藏真实发件人。示例分析:在Received路径中,如果初始服务器IP来自匿名代理,则邮件可能来自恶意源。识别邮件完整性:- 步骤:1.
Message 1: From "fl-testmail"root@fl.com Fri Jun 21 20:18:03 2019 Return-Path: <"fl-testmail"root@fl.com Status: RO this is a test mail from fly & t 2 Message 2: From fly@fl.com Fri Jun 21 20:37:00 2019 Return-Path
通过解析Received、Return-Path、X-Originating-IP等字段,构建发件服务器信誉画像。 from_domain):score += 0.4if last_hop_ip and is_ip_in_risk_country(last_hop_ip):score += 0.5if headers.get('Return-Path = from_domain:score += 0.3 # 发件人与Return-Path不一致return score > 0.7 # 阈值可调5.2 OAuth权限监控模块import msalimport
Return-Path: <[email]test@sina.com[/email]> X-Original-To: [email]leeki.yan@trinet.eb.cn[/email] Delivered-To
host. 9.查看已发送的邮件 [root@mail ~]# cat /home/tom/Maildir/new/1565704964.V803I1801d6M927346.mail.xls.com Return-Path
.= "Return-Path: info@yoursite.com\r\n"; $headers .= "X-Mailer: PHP5\n"; $headers .= 'MIME-Version
1 messages: 1 448 . retr 1 // 获取编号为1的邮件 +OK 448 octets Return-Path
例如,一封典型钓鱼邮件的邮件头可能如下:Return-Path: <bounce@sendgrid.net>Received-SPF: pass (sender SPF authorized)DKIM-Signature 3 邮件认证机制失效分析尽管SPF、DKIM、DMARC构成现代邮件安全的三大支柱,但在本次攻击中均存在可被利用的薄弱点:SPF局限性:仅验证MAIL FROM(Return-Path),不验证Header
root@localhost ~]# cat /var/spool/mail/root From root@localhost.localdomain Mon Jan 25 15:04:01 2021 Return-Path
基于协议漏洞的IP泄露邮件服务器关联分析:通过目标网站的邮件服务(如密码重置、订阅邮件)提取邮件头中的Return-Path或Received字段,直接获取未受Cloudflare保护的邮件服务器IP。
raw_email_content) analysis_result = { 'from_address': msg.get('From'), 'return_path': msg.get('Return-Path 检查 Return-Path 与 From 地址的一致性 (基础伪造检测) from_domain = extract_domain(msg.get('From')) return_domain = extract_domain(msg.get('Return-Path')) if from_domain and return_domain and from_domain ! : analysis_result['suspicious_indicators'].append("Domain Mismatch: From domain differs from Return-Path
parsedate_to_datetimedef check_suspicious_headers(raw_email):msg = email.message_from_string(raw_email)alerts = []# 检查Return-Path 与From是否一致return_path = msg.get('Return-Path', '').strip('<>')from_addr = msg.get('From', '')if '@' in from_addr.split('@')[-1].rstrip('>')if return_path and not return_path.endswith(from_domain):alerts.append("Return-Path
userspace_ksplice, repository not found,具体邮件内容如下: From root@valdb01.oracle.com Wed Jun 16 19:09:02 2021 Return-Path
须藤-l回显 紧接着我在jim的目录下发现了一个文件,文件里好像是一封邮件信息: From root@dc-4 Sat Apr 06 20:20:04 2019 Return-path: <root@dc
%7C In-Reply-To %7C 针对哪封邮件进行回复的标识符 %7C%7C References %7C 相关邮件的标识符列表 %7C%7C Return-Path