From the course: CompTIA Cybersecurity Analyst (CySA+) (CS0-003) Cert Prep (2024)

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

Malicious email content

Malicious email content

- [Instructor] Email is one of the most commonly exploited threat vectors. Attackers often send email to their targets, seeking to get them to take some action that offers the attacker an initial foothold from which to launch their attack. Email is the most common threat vector for a simple reason. It is very easy to exploit. In its most basic form, email has very few security features, and it's trivial for even a moderately skilled attacker to send forged email messages. Email relies on a protocol called the Simple Mail Transfer Protocol, or SMTP. SMTP is used to transfer messages around the Internet, beginning at the originating user system, then traversing a series of email servers until the message reaches its final destination. The major flaw inherent in SMTP is that it doesn't include any authentication for those relayed messages. Anyone can easily insert a message into the email system with any to and from address that they choose. Now, that's starting to change with some new…

Contents