翻訳と辞書
Words near each other
・ Directors register
・ Directors UK
・ Directors' duties
・ Directors' duties in the United Kingdom
・ Directors' Fortnight
・ Directory
・ Directory (computing)
・ Directory (OpenVMS command)
・ Directory Access Protocol
・ Directory assistance
・ Directory Assistance Service
・ Directory for Family Worship
・ Directory for Masses with Children
・ Directory for Public Worship
・ Directory for public worship
Directory Harvest Attack
・ Directory information tree
・ Directory of International Associations of the Faithful
・ Directory of Open Access Journals
・ Directory of services
・ Directory of Social Change
・ Directory of the Northern Ireland Troubles
・ Directory Opus
・ Directory service
・ Directory Services Markup Language
・ Directory Services Restore Mode
・ Directory structure
・ Directory System Agent
・ Directory traversal attack
・ Directory Utility


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Directory Harvest Attack : ウィキペディア英語版
Directory Harvest Attack

A directory harvest attack (DHA) is a technique used by spammers in an attempt to find valid/existent e-mail addresses at a domain by using brute force. The attack is usually carried out by way of a standard dictionary attack, where valid e-mail addresses are found by brute force guessing valid e-mail addresses at a domain using different permutations of common usernames. These attacks are more effective for finding e-mail addresses of companies since they are likely to have a standard format for official e-mail aliases (i.e. jdoe@example.domain, johnd@example.domain, or johndoe@example.domain).
There are two main techniques for generating the addresses that a DHA targets. In the first, the spammer creates a list of all possible combinations of letters and numbers up to a maximum length and then appends the domain name. This would be described as a standard brute force attack. This technique would be impractical for usernames longer than 5-7 characters. For example, one would have to try 368 (nearly 3 trillion) e-mail addresses to exhaust all 8-character sequences.
The other, more targeted technique, is to create a list that combines common first name and surnames and initials (as in the example above). This would be considered a standard dictionary attack when guessing usernames for e-mail addresses. The success of a directory harvest attack relies on the recipient e-mail server rejecting e-mail sent to invalid recipient e-mail addresses during the Simple Mail Transport Protocol (SMTP) session. Any addresses to which email is accepted are considered valid and are added to the spammer's list (which is commonly sold between spammers). Although the attack could also rely on Delivery Status Notifications (DSNs) to be sent to the sender address to notify of delivery failures, directory harvest attacks likely don't use a valid sender e-mail address.
The actual e-mail message generated to the recipient addresses will usually be a short random phrase such as "hello", so as not to trigger a spam filter. The actual content that is to be advertised will be sent in a later campaign to just the valid email addresses.
One theory is that spammers also use DHAs to disseminate spam, and not just to collect email addresses for a later spam campaign. Using the method in this way, similar to a paper-based leaflet drop, the sender achieves the goal based on sheer volume, and not on accuracy of delivery. Using this method, the message would likely contain the content that the spammer is advertising, and not a short random phrase.
==References==

*(Definition on Postini.com ) – a major e-mail services provider.


抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Directory Harvest Attack」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.