09-12-2021 02:28 AM - edited 09-12-2021 02:29 AM
Hello,
Following best practices, we performed an annual pentest.
We found out that the attacker is able to fingerprint valid e-mail accounts via brute-force after connecting to the ironport and change the recipient of the message to an e-mail.
In case the e-mail is invalid ironport with "550 #5.1.0 Address rejected", otherwise it answers with "250 recipient <valid_mail> ok"
What we should do to strengthen our email security gateway and avoid this kind of attacks in the future?
Thanks in advance,
Spacemeb
Solved! Go to Solution.
09-13-2021 07:53 AM
09-13-2021 05:51 AM
any advise?
09-13-2021 07:53 AM
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: