<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>spam &#8211; VeriTeknik</title>
	<atom:link href="https://www.veriteknik.net.tr/en/tag/spam/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.veriteknik.net.tr/en/</link>
	<description>VeriTeknik Bilişim &#124; VeriTeknik Bilişim</description>
	<lastBuildDate>Mon, 18 Mar 2019 07:45:01 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Finding spammer php script in DirectAdmin</title>
		<link>https://www.veriteknik.net.tr/en/finding-spammer-php-script-directadmin/</link>
					<comments>https://www.veriteknik.net.tr/en/finding-spammer-php-script-directadmin/#respond</comments>
		
		<dc:creator><![CDATA[Fehmi Can Tokay]]></dc:creator>
		<pubDate>Sat, 28 Jan 2017 13:13:04 +0000</pubDate>
				<category><![CDATA[DirectAdmin]]></category>
		<category><![CDATA[directadmin]]></category>
		<category><![CDATA[find]]></category>
		<category><![CDATA[spam]]></category>
		<guid isPermaLink="false">http://www.plugged.in/?p=1113</guid>

					<description><![CDATA[<p>There is an easy method to find spammer php script in your home path. Directadmin logs these spammer scripts which are using phpmailer or similar things. To find this: Go to your home path cd /home Find your log files find ./ -type f -size +1k -name "php-mail.log" After this find operation, you can see [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/finding-spammer-php-script-directadmin/">Finding spammer php script in DirectAdmin</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>There is an easy method to find spammer php script in your home path. Directadmin logs these spammer scripts which are using phpmailer or similar things. To find this:</p>
<ol>
<li style="list-style-type: none;">
<ol>
<li>Go to your home path</li>
</ol>
</li>
</ol>
<pre class="EnlighterJSRAW" data-enlighter-language="shell">cd /home</pre>
<ol>
<li style="list-style-type: none;">
<ol>
<li>Find your log files</li>
</ol>
</li>
</ol>
<pre class="EnlighterJSRAW" data-enlighter-language="shell">find ./ -type f -size +1k -name "php-mail.log"</pre>
<p>After this find operation, you can see your log files. It means, users that have this log file are could be the potential spammer.</p>
<ol>
<li style="list-style-type: none;">
<ol>
<li>Tailf your log file.</li>
</ol>
</li>
</ol>
<pre class="EnlighterJSRAW" data-enlighter-language="shell">tailf /home/user/.php/php-mail.log</pre>
<p>&nbsp;</p>
<ol>
<li style="list-style-type: none;">
<ol>
<li>You can see spammer scripts.!!</li>
</ol>
</li>
</ol>
<pre class="brush: bash; gutter: true; first-line: 1">mail() on [/home/user/domains/domain.com.tr/public_html/modules/mod_users_latest/files.php(1947) : eval()'d code:775]: To: user@hotmail.com -- Headers: Date: Sat, 28 Jan 2017 15:51:47 +0300 From: Flora &lt;user@domain.com.tr&gt; Message-ID: &lt;3f796c9fb6de893f060882897f360bea@domain.com.tr&gt; X-Priority: 3 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="b1_3f796c9fb6de893f060882897f360bea" Content-Transfer-Encoding: 8bit</pre>
<ol>
<li style="list-style-type: none;">
<ol>
<li>Remove this peace of shit.</li>
</ol>
</li>
</ol>
<pre class="brush: bash; gutter: true; first-line: 1">rm /home/user/domains/domain.com.tr/public_html/modules/mod_users_latest/files.php</pre>
<p>You can easiliy get rid of these spammer scripts using this method. Don&#8217;t forget to clear your mail queue after this operation.</p>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/finding-spammer-php-script-directadmin/">Finding spammer php script in DirectAdmin</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.veriteknik.net.tr/en/finding-spammer-php-script-directadmin/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1113</post-id>	</item>
		<item>
		<title>Delete Mail From Queue in Exim</title>
		<link>https://www.veriteknik.net.tr/en/delete-mail-from-queue-in-exim/</link>
					<comments>https://www.veriteknik.net.tr/en/delete-mail-from-queue-in-exim/#respond</comments>
		
		<dc:creator><![CDATA[Mustafa Emre Aydın]]></dc:creator>
		<pubDate>Fri, 18 Jan 2013 15:43:58 +0000</pubDate>
				<category><![CDATA[DirectAdmin]]></category>
		<category><![CDATA[LINUX]]></category>
		<category><![CDATA[exim]]></category>
		<category><![CDATA[mail]]></category>
		<category><![CDATA[spam]]></category>
		<guid isPermaLink="false">http://www.plugged.in/?p=767</guid>

					<description><![CDATA[<p>Deleting email from the exim queue is unfortunately not that simple. If you have a massive spammer in your system, you can clear the email originating from them with the command below. exim -bpru &#124; tr '\n' + &#124; sed -e "s/++/=/g" &#124; tr -d + &#124; tr = '\n' &#124; grep "spammer@email.com" &#124; awk [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/delete-mail-from-queue-in-exim/">Delete Mail From Queue in Exim</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Deleting email from the exim queue is unfortunately not that simple. If you have a massive spammer in your system, you can clear the email originating from them with the command below.</p>
<pre class="brush: bash; gutter: true; first-line: 1">exim -bpru | tr '\n' + | sed -e "s/++/=/g" | tr -d + | tr = '\n' | grep "spammer@email.com" | awk {'print $3'} | xargs exim -Mrm</pre>
<p>Simple replace the spammer@email.com address with the potential spammer.<br />
Don&#8217;t forget that this command uses the whole queue list to process. Sometimes if you have hundreds of thousands of email from this spammer in queue, it will get hard to process them all for the system. So instead of using the whole queue list, we can break it down to pieces with the head command.</p>
<p>The command below will break it down to pieces of 5000, so if you have more than 5000, you should run this command several times.</p>
<pre class="brush: bash; gutter: true; first-line: 1">exim -bpru | head -n 5000 | tr '\n' + | sed -e "s/++/=/g" | tr -d + | tr = '\n' | grep "spammer@email.com" | awk {'print $3'} | xargs exim -Mrm</pre>
<p>To delete all mails from the queue, simply use this command.</p>
<pre class="brush: bash; gutter: true; first-line: 1">exim -bp | awk '/^ *[0-9]+[mhd]/{print "exim -Mrm " $3}' | sh</pre>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/delete-mail-from-queue-in-exim/">Delete Mail From Queue in Exim</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.veriteknik.net.tr/en/delete-mail-from-queue-in-exim/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">767</post-id>	</item>
		<item>
		<title>Detecting Possible Mail Forgers in EXIM</title>
		<link>https://www.veriteknik.net.tr/en/detecting-possible-mail-forgers-in-exim/</link>
					<comments>https://www.veriteknik.net.tr/en/detecting-possible-mail-forgers-in-exim/#respond</comments>
		
		<dc:creator><![CDATA[Mustafa Emre Aydın]]></dc:creator>
		<pubDate>Fri, 23 Mar 2012 12:15:12 +0000</pubDate>
				<category><![CDATA[LINUX]]></category>
		<category><![CDATA[exim]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[spam]]></category>
		<guid isPermaLink="false">http://www.plugged.in/?p=243</guid>

					<description><![CDATA[<p>The other day we were working on a mail server of a customer&#8217;s that spammed insanely. Since the mail transfer agent it uses is exim, it&#8217;s necessary to check the mainlog files. Whilst doing that, we realized the server was getting a lot of incoming mails as forgery. So, it is possible to get the [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/detecting-possible-mail-forgers-in-exim/">Detecting Possible Mail Forgers in EXIM</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The other day we were working on a mail server of a customer&#8217;s that spammed insanely. Since the <a href="http://en.wikipedia.org/wiki/Message_transfer_agent" target="_blank">mail transfer agent</a> it uses is <a href="http://www.exim.org/" target="_blank">exim</a>, it&#8217;s necessary to check the <a href="http://www.exim.org/exim-html-current/doc/html/spec_html/ch49.html" target="_blank">mainlog</a> files.</p>
<p>Whilst doing that, we realized the server was getting a lot of incoming mails as forgery. So, it is possible to get the IP list of the possible forgerers.</p>
<p>To do this, we need to check the lines that indicate an INCOMING message, and that claims it uses our mail server itself as a sender, but actually connects through a different IP address.</p>
<p>Exim uses the notation <strong> for incoming messages, so it is easy to catch.<br />
It also uses the notation <strong>H=IP.ADD.RE.SS</strong> to state the IP address (or the hostname) of the incoming message. The beauty in this is that, it also gets the real IP address and checks if they match, if they don&#8217;t match, then it brackets the H= value like this <strong>H=(IP.ADD.RE.SS)</strong> and right after that, gives the real IP address with boxed brackets. <strong>[REAL.IP.ADD.RESS]</strong></strong></p>
<p>To detect forgeries done in a time period, and getting ONLY the IP address is crutial when you want check those IP addresses with others tools and scripts. So here&#8217;s an example <strong>grep</strong> line :</p>
<p><code>grep -ohP "(?</code></p>
<p>The example above, assumes that your mailserver&#8217;s IP Address is 10.1.31.33, of course this won&#8217;t be the case since it&#8217;s a local ip, so change that with yours.<br />
It also checks for attempts in <em>March 2012</em>, you can also edit this, since we&#8217;re using the Perl compatible regular expressions (the -P option of grep) than we can use <strong>..</strong> as wildcards for 2 characters (the day indicator).<br />
Since we&#8217;re checkig for more than 1 file, (<em>mainlog*</em>) grep will output the filenames too, the -h option is to suppress that.<br />
Also, we&#8217;re piping the output to <strong>uniq</strong>, so that we don&#8217;t get multiple results for the same IP address.<br />
Now you can simply redirect these IP addresses to your script/tool or save them for other purpose.</p>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/detecting-possible-mail-forgers-in-exim/">Detecting Possible Mail Forgers in EXIM</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.veriteknik.net.tr/en/detecting-possible-mail-forgers-in-exim/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">243</post-id>	</item>
	</channel>
</rss>
