09-12-2021 02:28 AM - edited 09-12-2021 02:29 AM
Hello,
Following best practices, we performed an annual pentest.
We found out that the attacker is able to fingerprint valid e-mail accounts via brute-force after connecting to the ironport and change the recipient of the message to an e-mail.
In case the e-mail is invalid ironport with "550 #5.1.0 Address rejected", otherwise it answers with "250 recipient <valid_mail> ok"
What we should do to strengthen our email security gateway and avoid this kind of attacks in the future?
Thanks in advance,
Spacemeb
Solved! Go to Solution.
09-13-2021 07:53 AM
09-13-2021 05:51 AM
any advise?
09-13-2021 07:53 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide