Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/BLACK-SCORP10/Email-Vulnerability-Checker

Find Email Spoofing Vulnerablity of domains
https://github.com/BLACK-SCORP10/Email-Vulnerability-Checker

automation bash big bug-bounty bug-checker bugbounty bugbounty-tool bulk checker dmarc infosys shell spf spf-record vulnerablity

Last synced: about 2 months ago
JSON representation

Find Email Spoofing Vulnerablity of domains

Awesome Lists containing this project

README

        







Email Vulnerability Checker v2.1


Verify whether the domain is vulnerable to spoofing by Email-vulnerablity-checker

## Features of Version 2.1

- Added Support to save output on a file using -o flag
- Added more checks that will accurately tell you the Vulnerability Status.
- Updated the code completely with proper and accurate results.
- Enhanced the tool and decorated some look and feel on the tool.

Email Vulnerability Checker

This script checks the SPF and DMARC configurations of email domains to determine their vulnerability status. It's useful for system administrators or security professionals to assess email infrastructure security.

## Usage

To run the script, execute it with the following command:

./spfvuln.sh [options]

### Options

- -h, --help: Display the help message.
- -v: Display the version of the script.
- -t : Specify a file containing a list of domains to check.
- -d : Specify a single domain to check.
- -o : Specify an output file to save the results.

## Requirements

- Bash-compatible shell: Ensure your system supports Bash scripting.
- nslookup command: Make sure the nslookup command is installed and available in your system's PATH.

### Installation Steps

1. **Clone the Repository:**
```
git clone https://github.com/BLACK-SCORP10/Email-Vulnerability-Checker.git
```

2. **Navigate to the Directory:**
```
cd Email-Vulnerability-Checker
```

3. **Make the Script Executable:**
```
chmod +x spfvuln.sh
```

4. **Install Requirements:**

**For Ubuntu or Debian:**
```
sudo apt update
sudo apt install dnsutils
```

**For CentOS or RHEL:**
```
sudo yum install bind-utils # CentOS, RHEL
```
or
```
sudo dnf install bind-utils # Fedora
```

5. **Verify Installation:**
```
nslookup example.com
```
or
```
nslookup -version
```

### Usage

#### Example Usage

**Checking a single domain:**
```
./spfvuln.sh -d example.com
```

**Checking multiple domains from a file:**
```
./spfvuln.sh -t domains.txt
```

**Saving results to an output file:**
```
./spfvuln.sh -d example.com -o output.txt
```
## Updating the tool
To update your tool after a new version has been released, follow these steps:

1. **Navigate to the Tool Directory:**
```
cd Email-Vulnerability-Checker
```

2. **Pull the Latest Changes from the Remote Repository:**
```
git pull origin main
```

### Notes

- Replace `example.com` with the domain you want to check.
- Ensure `spfvuln.sh` is executable (`chmod +x spfvuln.sh`) before use.
- Detailed information about the tool's options and functionality can be found by running `./spfvuln.sh -h` or `./spfvuln.sh --help`.
## Preview

## Detail Description On Configurations Flag

SPF Configuration | DMARC Configuration | Vulnerability Status | Explanation
-------------------|----------------------|----------------------|---------------------------------------------------------------------------------------------------------------------------------------
-all | Reject | Not Vulnerable | SPF (-all) with DMARC reject policy ensures that unauthorized emails are rejected outright, minimizing spoofing risks.
-all | Quarantine | Less Vulnerable | SPF (-all) with DMARC quarantine policy sends unauthorized emails to spam or a designated folder, reducing risks.
-all | None | Vulnerable | SPF (-all) without DMARC leaves some vulnerability, as DMARC can enhance email authentication and alignment.
-all | No Answer | Vulnerable | The presence of "redirect" or other mechanisms not explicitly defined can lead to vulnerabilities, depending on the redirected domain's SPF configuration.
~all | Reject | Less Vulnerable | SPF soft fail (~all) with DMARC reject policy may allow unauthorized emails but rejects those failing DMARC alignment.
~all | Quarantine | More Vulnerable | SPF soft fail (~all) with DMARC quarantine policy may allow unauthorized emails but sends them to spam or a designated folder.
~all | None | Vulnerable | SPF soft fail (~all) without DMARC leaves more vulnerability, as DMARC can enhance email authentication and alignment.
~all | No Answer | Vulnerable | The presence of "redirect" or other mechanisms not explicitly defined can lead to vulnerabilities, depending on the redirected domain's SPF configuration.
+all | Reject | Vulnerable | SPF pass (+all) with DMARC reject policy is vulnerable as it accepts all emails without proper authentication or alignment.
+all | Quarantine | More Vulnerable | SPF pass (+all) with DMARC quarantine policy may allow all emails but sends unauthorized ones to spam or a designated folder.
+all | None | Vulnerable | SPF pass (+all) without DMARC leaves vulnerability, as DMARC can enhance email authentication and alignment.
+all | No Answer | Vulnerable | The presence of "redirect" or other mechanisms not explicitly defined can lead to vulnerabilities, depending on the redirected domain's SPF configuration.
?all | Reject | Vulnerable | SPF neutral (?all) with DMARC reject policy doesn't provide strong protection, potentially allowing unauthorized emails.
?all | Quarantine | More Vulnerable | SPF neutral (?all) with DMARC quarantine policy may allow unauthorized emails but sends them to spam or a designated folder.
?all | None | Vulnerable | SPF neutral (?all) without DMARC leaves vulnerability, as DMARC can enhance email authentication and alignment.
?all | No Answer | Vulnerable | The presence of "redirect" or other mechanisms not explicitly defined can lead to vulnerabilities, depending on the redirected domain's SPF configuration.
N/A | Reject | Vulnerable | Without SPF, DMARC reject policy doesn't provide strong protection against unauthorized emails, potentially allowing spoofing and phishing.
N/A | Quarantine | More Vulnerable | Without SPF, DMARC quarantine policy may allow unauthorized emails but sends them to spam or a designated folder.
N/A | None | Highly Vulnerable | Without SPF, DMARC none policy leaves the domain highly vulnerable to various email-based threats, including spoofing and phishing attacks.
N/A | No Answer | Highly Vulnerable | The absence of both SPF and DMARC records leaves the domain highly vulnerable to various email-based threats, including spoofing and phishing attacks, especially if "redirect" or other mechanisms not explicitly defined are present.

Other types are Redirect Mechanism and Multiple SPF Flags.
- On Redirect Mechanism, The DMARC redirects to another domain/subdomain for the policies that is used over the domains. Better to check it manually.
- On Multiple SPF Flags, The SPF has more then one defined flags, "A domain must not have multiple SPF records as both will be declined by the recipient server, making the authentication impossible". You can report this.

## Author

This Email Vulnerability Checker script was created by BLACK-SCORP10. For queries or feedback, contact the author via Telegram: BLACK-SCORP10.

## Version

Current version: 2.1

## Disclaimer

This script is provided as-is, Use it at your own risk.

### Support

For Queries: [Telegram](https://t.me/BLACK_SCORP10)
Contributions, issues, and feature requests are welcome!
Give a ★ if you like this project!

### License
This project is licensed under the MIT License - see the LICENSE file for details.