Chapter 10: E-mail Filtering


Overview

The key logger created in Chapter 8 can be enhanced to log from only e-mail applications, and the network filter created in Chapter 7 can be enhanced to sift through low-level protocols and piece together e-mail; but in a business environment where Microsoft Exchange Server or Lotus Domino Server is being used, there is a better way. These corporate e-mail solutions provide the capability to extend client functionality through the use of specially crafted Dynamic Link Libraries. All that is needed to filter e-mail in this environment is an understanding of the extension interface built into the target e-mail system.

This chapter includes the following:

  • Microsoft Outlook e-mail filtering

  • Installing an Outlook client filter

  • Testing the Outlook client extension

  • Lotus Notes e-mail filtering

  • Installing a Lotus Notes client filter

  • Testing the Lotus Notes client extension




Professional Rootkits
Professional Rootkits (Programmer to Programmer)
ISBN: 0470101547
EAN: 2147483647
Year: 2007
Pages: 229
Authors: Ric Vieler

Similar book on Amazon
Rootkits: Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel
A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core
Reversing: Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net