Email Spoofing & SPF/DKIM Evasion
Successful phishing relies on landing in the inbox. Attackers analyze a target's DNS records to find misconfigurations in Sender Policy Framework (SPF) or DMARC policies, allowing them to spoof legitimate internal emails.
# Checking target DMARC policy dig +short TXT _dmarc.target.com # Checking SPF record dig +short TXT target.com | grep "v=spf1"
The Trap: If DMARC is set to p=none, an attacker can trivially forge emails appearing to be from the CEO.
