Spam techniky

volesak na aristia.cz volesak na aristia.cz
Úterý Září 2 13:05:31 CEST 2003


Dobry den,
setkal jsem se nyni se spamerem, ktery obchazi WinProxy a posila pres ni
spamy. Je to zvlastni, dle podpory WinProxy je vse OK, ale kdyz se povoli
provoz z inkriminovaneho(-ych) subnetu, rozjede se to znovu. Tu WinProxy
jsem nechal testovat na ordb.org ale vysledek nula. Zrejme pouziva nejakou
lepsi techniku, nez testovaci server. Bohuzel nas mel jako nadrizeny SMTP a
jelo to asi 24 hodin.
Nize je uveden mail jak mi ho predal nas zakaznik. Snad je uplny. Vite
nekdo, jak to ten clobrda provedl a jak se tomu branit?
Diky
Honza Volesak
P.S. IP adresa zakaznika je x.x.x.x a IP spamera je dle RIPE ALLOCATED
UNSPECIFIED


$$ <tell na 163.COM>
T <telliott na medmail.com>
T <neil.fensom na btinternet.com>
T <telliott na megsinet-clec.com>

Received: from 218.70.144.111 by x.x.x.x (WinProxy); Tue, 2 Sep 2003
08:27:11 +0100
Date: Tue, 2 Sep 2003 06:27:59 GMT
From: "Lou Biggs"<tell na 163.COM>
To: telliott na medmail.com
Subject: saturate
Mime-Version: 1.0
Content-Type: text/html; charset=us-ascii
Content-Transfer-Encoding: 7bit

<html>
<head>
<title></title>
<meta http-equiv="Content-Type" content="text/html; charset=gb2312">
</head>

<body bgcolor="#FFFFFF" text="#000000">
<p>Suppose we tell you that you could really lose up to 82% of your unwanted
body 
  fat and keep it off in just a few months, would you be interested? We
certainly 
  hope so!<br>
  please visit our web site <a href="http://www.cheaperoffer.com/?301">click

  here</a></p>
<p><a href="http://domianss2.com/hgh/rm.html">Remove mail</a></p>
<font
color="#ffffff">[RANDOMIZE][RANDOMIZE][RANDOMIZE][RANDOMIZE][RANDOMIZE]</bod
y>
</html>


Další informace o konferenci Sendmail