gospoofcheck

command module
v0.0.0-...-db81b43 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Sep 15, 2023 License: MIT Imports: 10 Imported by: 0

README

gospoofcheck

A Go copy of the original spoofcheck written by BishopFox: https://github.com/BishopFox/spoofcheck/tree/master

also had to copy / re-write this library: https://github.com/lunarca/pyemailprotectionslib/tree/master/emailprotectionslib

A program that checks if a domain can be spoofed from. The program checks SPF and DMARC records for weak configurations that allow spoofing.

Additionally it will alert if the domain has DMARC configuration that sends mail or HTTP requests on failed SPF/DKIM emails.

The colours are changed in this version to display from a blue team perspective.

Domains are spoofable if any of the following conditions are met:

  • Lack of an SPF or DMARC record
  • SPF record never specifies ~all or -all
  • DMARC policy is set to p=none or is nonexistent

Example output

%$ go run . domain.com

[+] Processing domain: domain.com
[+] Found SPF record: v=spf1 include:_spf.domain.com -all
[+] SPF record contains an "All" item: -all

[+] Processing domain: domain.com
[+] DMARC percentage is set to 50% - spoofing might be possible
[+] Aggregate reports will be sent: mailto:dmarcreports@domain.com
[+] Forensics reports will be sent: mailto:dmarcreports_fo@domain.com
[+] DMARC policy set to: quarantine

Documentation

The Go Gopher

There is no documentation for this package.

Directories

Path Synopsis
emailprotections
spf

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL