SlideShare a Scribd company logo
EMAIL BOMBING
WHAT IS EMAIL BOMBING?
• AN EMAIL BOMB IS A FORM OF INTERNET ABUSE WHICH IS
PERPETRATED THROUGH THE SENDING OF MASSIVE VOLUMES OF
EMAIL TO A SPECIFIC EMAIL ADDRESS WITH THE GOAL OF
OVERFLOWING THE MAILBOX AND OVERWHELMING THE MAIL
SERVER HOSTING THE ADDRESS, MAKING IT INTO SOME FORM OF
DENIAL OF SERVICE ATTACK.
MASS MAILING
• INVOLVES SENDING NUMEROUS DUPLICATES
OF THE SAME EMAIL TO ONE EMAIL
ADDRESS. BECAUSE OF THE SIMPLICITY OF
THIS ATTACK, IT CAN BE EASILY DETECTED BY
SPAM FILTERS. TO BE DONE ON A MASSIVE
SCALE, AN ATTACKER CAN USE A BOT NET
OR ZOMBIE NET, COMPUTERS ACROSS THE
GLOBE WHICH ARE UNDER THE ATTACKER’S
CONTROL DUE TO SOME FORM OF
MALWARE SUCH AS TROJANS, AND THEN
INSTRUCTING THE BOT NET TO SEND
MILLIONS OF EMAILS TO A SINGLE OR A FEW
ADDRESSES AT ONCE IN ORDER TO PERFORM
A DENIAL OF SERVICE ATTACK.
LIST LINKING
• MEANT MORE TO ANNOY RATHER THAN CAUSE REAL TROUBLE. THE TECHNIQUE INVOLVES
SUBSCRIBING THE ADDRESS FOR ATTACK TO DIFFERENT EMAIL LIST SUBSCRIPTIONS SO IT WOULD
ALWAYS RECEIVE SPAM MAIL FROM THESE LISTS. THE USER THEN HAS TO MANUALLY
UNSUBSCRIBE FROM EACH LIST. HOWEVER, MORE LEGITIMATE LISTS REQUIRE EMAIL VERIFICATION
WHICH THE USER HAS TO MANUALLY CLICK AND ACCEPT TO BE PART OF THE EMAIL LISTING. TO
CIRCUMVENT THIS, THE ATTACKER MAY REGISTER A NEW EMAIL ACCOUNT AND SUBSCRIBE THAT
TO ALL THE LISTS AND HAVE IT AUTOMATICALLY FORWARD ALL MAIL TO THE VICTIM. THE
ATTACKER CAN REPLY TO THE CONFIRMATION EMAILS.
ZIP BOMBING
• THE LATEST TWIST ON EMAIL BOMBING
USING ZIP ARCHIVED ATTACHMENTS. MAIL
SERVERS ALWAYS CHECK EMAIL
ATTACHMENTS FOR VIRUSES, ESPECIALLY ZIP
ARCHIVES AND .EXE FILES. THE IDEA HERE IS
TO PLACE A TEXT FILE WITH MILLIONS OR
BILLIONS OF ARBITRARY CHARACTERS OR
EVEN A SINGLE LETTER REPEATED MILLIONS
OF TIMES SO THAT THE SCANNER WOULD
REQUIRE A GREATER AMOUNT OF
PROCESSING POWER TO READ EACH ONE.
COMBINING THIS WITH MASS MAILING
TECHNIQUES UPS THE POTENTIAL FOR A
DENIAL OF SERVICE ATTACK TO SUCCEED.

More Related Content

What's hot

Denial of service
Denial of serviceDenial of service
Denial of service
garishma bhatia
 
PHISHING DETECTION
PHISHING DETECTIONPHISHING DETECTION
PHISHING DETECTION
umme ayesha
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
shindept123
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
Jorge Sebastiao
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rohitha Sankar
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
Akmal Hussain
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Altacit Global
 
Cyber crimes presentation
Cyber crimes presentationCyber crimes presentation
Cyber crimes presentation
Digital Marketing Evangelist
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
GouthamXander
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
Nikolaos Georgitsopoulos
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
sourav newatia
 
Detection of phishing websites
Detection of phishing websitesDetection of phishing websites
Detection of phishing websites
m srikanth
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
Tejesh Dhaypule
 
Ppt
PptPpt
Software piracy
Software piracySoftware piracy
Software piracy
K. M. Rokonuzzaman
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
Shishupal Nagar
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
Trevschic
 
Phishing
PhishingPhishing
Phishing
HHSome
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
jumanne rajabu
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
SAIKAT BISWAS
 

What's hot (20)

Denial of service
Denial of serviceDenial of service
Denial of service
 
PHISHING DETECTION
PHISHING DETECTIONPHISHING DETECTION
PHISHING DETECTION
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber crimes presentation
Cyber crimes presentationCyber crimes presentation
Cyber crimes presentation
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Detection of phishing websites
Detection of phishing websitesDetection of phishing websites
Detection of phishing websites
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Ppt
PptPpt
Ppt
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Phishing
PhishingPhishing
Phishing
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 

Recently uploaded

可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
AanSulistiyo
 

Recently uploaded (20)

可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
 

Email bombing

  • 2. WHAT IS EMAIL BOMBING? • AN EMAIL BOMB IS A FORM OF INTERNET ABUSE WHICH IS PERPETRATED THROUGH THE SENDING OF MASSIVE VOLUMES OF EMAIL TO A SPECIFIC EMAIL ADDRESS WITH THE GOAL OF OVERFLOWING THE MAILBOX AND OVERWHELMING THE MAIL SERVER HOSTING THE ADDRESS, MAKING IT INTO SOME FORM OF DENIAL OF SERVICE ATTACK.
  • 3. MASS MAILING • INVOLVES SENDING NUMEROUS DUPLICATES OF THE SAME EMAIL TO ONE EMAIL ADDRESS. BECAUSE OF THE SIMPLICITY OF THIS ATTACK, IT CAN BE EASILY DETECTED BY SPAM FILTERS. TO BE DONE ON A MASSIVE SCALE, AN ATTACKER CAN USE A BOT NET OR ZOMBIE NET, COMPUTERS ACROSS THE GLOBE WHICH ARE UNDER THE ATTACKER’S CONTROL DUE TO SOME FORM OF MALWARE SUCH AS TROJANS, AND THEN INSTRUCTING THE BOT NET TO SEND MILLIONS OF EMAILS TO A SINGLE OR A FEW ADDRESSES AT ONCE IN ORDER TO PERFORM A DENIAL OF SERVICE ATTACK.
  • 4. LIST LINKING • MEANT MORE TO ANNOY RATHER THAN CAUSE REAL TROUBLE. THE TECHNIQUE INVOLVES SUBSCRIBING THE ADDRESS FOR ATTACK TO DIFFERENT EMAIL LIST SUBSCRIPTIONS SO IT WOULD ALWAYS RECEIVE SPAM MAIL FROM THESE LISTS. THE USER THEN HAS TO MANUALLY UNSUBSCRIBE FROM EACH LIST. HOWEVER, MORE LEGITIMATE LISTS REQUIRE EMAIL VERIFICATION WHICH THE USER HAS TO MANUALLY CLICK AND ACCEPT TO BE PART OF THE EMAIL LISTING. TO CIRCUMVENT THIS, THE ATTACKER MAY REGISTER A NEW EMAIL ACCOUNT AND SUBSCRIBE THAT TO ALL THE LISTS AND HAVE IT AUTOMATICALLY FORWARD ALL MAIL TO THE VICTIM. THE ATTACKER CAN REPLY TO THE CONFIRMATION EMAILS.
  • 5. ZIP BOMBING • THE LATEST TWIST ON EMAIL BOMBING USING ZIP ARCHIVED ATTACHMENTS. MAIL SERVERS ALWAYS CHECK EMAIL ATTACHMENTS FOR VIRUSES, ESPECIALLY ZIP ARCHIVES AND .EXE FILES. THE IDEA HERE IS TO PLACE A TEXT FILE WITH MILLIONS OR BILLIONS OF ARBITRARY CHARACTERS OR EVEN A SINGLE LETTER REPEATED MILLIONS OF TIMES SO THAT THE SCANNER WOULD REQUIRE A GREATER AMOUNT OF PROCESSING POWER TO READ EACH ONE. COMBINING THIS WITH MASS MAILING TECHNIQUES UPS THE POTENTIAL FOR A DENIAL OF SERVICE ATTACK TO SUCCEED.