Summary by Cutiapreta
Dmarc record's misconfiguration
Dmarc record's misconfiguration
*.odesli.co
Web App
When I create an account or perform any actions like a password reset for testing on the 'odesli.co' website, I receive emails from the email domain 'support@odesli.co.' However, when I check the DMARC record of the 'odesli.co' email domain, I find that the domain's policy is not set, which makes email spoofing possible from this email domain.
First, open your Linux terminal, whether it's Kali or Parrot.
Next, use the nslookup command with the following command: 'nslookup -type=txt _dmarc.odesli.co '
Now you can see in there is not dmarc record found.
Which means that email's domain is vulnerable for spoofing.
Save the attached email spoofing script to your Linux system.
Give command in kali or parrot : 'apt install postfix && apt install sendemail'
Provide executable permission to the script by running the following command: chmod +x mailspoofer.sh
Execute the script by using the following command, replacing receiver_email with the target recipient's email address: bash mailspoofer.sh receiver_email.
After executing mailspoofer.sh, you will be prompted to enter the email address where you want to send the phishing email. Input the email address you wish to target.
The screenshot(s) below demonstrates the mail server misconfiguration:
Phishing by resetting password
Phishing by pending payment
I can exploit this situation as an attacker to potentially deceive your customers through phishing attacks, potentially extracting significant funds and acquiring their credentials quite easily
We all know that major cyber attacks on companies often begin with email spoofing, accounting for up to 50% of such incidents. Therefore, these vulnerable email addresses can potentially become the root cause of significant cyberattacks on the company.
I provided a screenshot of the email to prove that this email domain actually exists because my previous submission was closed as a non-existent email domain. However, this email domain is real and is used by the website for security purposes. Please consider triaging this issue