SPF Vuln
SPF Vuln
Severity: Medium
The Impact: If there are no or invalid SPF Records, An attacker can spoof
email with any fake mailer Like https://anonymailer.net An attacker can
send email name “Company Name” and email in which this case is
[email protected] with social engineering attack they can takeover
user account, in some cases victim knows about phishing attacks but
when the victim sees the email from the authorized domain, victim will
more likely be tricked easily.
Remediation: The first step is to compile the appropriate SPF policy
and to do that, you need to read the document about the syntax of
SPF which can be found here: http://www.open-
spf.org/SPF_Record_Syntax/
If you use one of the most common email service providers, you can
just use one of the SPF policies listed below:
If no emails are sent from the domain (this is easily changed if you
want to start to send emails in the future), a simple SPF policy that
disallows all emails is recommended:
v=spf1 -all
To fully implement your SPF policy, there is only one step left, adding
it to the DNS record for the domain. Log in to control the name
server. If you don’t know where that is, the default name server from
the domain registrar (such as GoDaddy and NameCheap) is probably
used and that is where you should log in to manage the DNS records.
A TXT record should now be added with the value of the selected SPF
policy. In many cases, the SPF policy needs to be placed within
quotes.