I Hate Spam!

 

Over the past few weeks, I’ve come to find that my Outlook.com account has been inundated by Spam, and after talking to a family member I discovered its not just me. Microsoft is being defeated by spammers, because of a very simple trick.  The spammers are malforming the From Line on purpose.

spam2

 

Take this innocent email for example, notice the extra junk at the end of the message?  Well that is all it takes to fool Microsoft Spam Filters.  But it gets better.  You can mark the messages as junk and then try to block them, but you cannot.

 

 

Such a simple but effective trick.  The odd thing is that I forward my mail from Outlook.com to my Gmail.com account.  I have no issues filtering this Spam, and oftentimes Outlook.com does not forward the Spam, so there is some Spam Filtering on the forwarding side that actually works but not on the actual Inbox Side.  Microsoft, Google is continuing to eat your lunch.  Do something about this!  Or don’t, I do not care, I’m happier on the G Mail side anyway.

Fun with Nessus

Hat tip to LifeHacker for posting about Nessus.

I figured I’d give it a go on my network, and see what could be found.  I’ve worked in a previous life with Security Remediation, and while not fun it’s a necessary evil now.  I do this for fun, and I know as my lovely fiancee tells me repeatedly, I am a giant nerd.

The download and installation was simple enough, and I spent more time downloading and installing Windows Server 2016.  I’m hoping to have a Foreman Installation up and running soon that will automate my Windows Installs.  It’s easy enough to template a Windows 2016 VM with vSphere, but I’d like to learn another skill with Foreman and Puppet.

Installation was straightforward

  1.  Create an Administration Account
  2. Enter your key.  Hint remember to put the Dashes in as the GUI does not add them for you.
  3. Download the Nessus Definitions and initialize, note this takes a while.

capture

It took a good twenty minutes between download and initialization.

Pretty simple, select New Scan and Pick one.  I chose Basic Scan, told it to hit my entire subnet, and away it went.

capture

The scanner works pretty quickly and by clicking on the Name, and you can see the results in real time.  I do have a fair amount of vulnerabilities to look into, some of which I know about and some of which I wouldn’t.  It’d be a fun exercise to try to clean and secure my environment.

capture

Some are also useless.  For example, the below Warning popped up.  All the devices are Routers or other networking gear so you would expect that to be the case.  I guess it’s good to have if the device turns out to be a server.  It’s also nice to see that Nessus tells you how to fix the vulnerability.

capture

Sometimes Nessus does its best but fails pretty miserably.  I’ll give it credit that the device below is indeed a printer.

capture

Total scan time for about 30 devices, which are a mix of Linux, Solaris, and Windows, with a mix of other network devices, took about 30minutes.