Email Security Tester
Over 90% of email traffic has spam, phishing, malware and other electronic threats. Email is the main infection vector for ransomware and malware. This tool tests if your email server is correctly configured to stop these common threats.
What's the Test?
It's an email pen test. It tests if your email server is correctly configured to stop these common threats.
Your security product should block, disarm or disinfect all samples sent to you.
Should some test emails reach your inbox, don't jump to conclusions — read the
email description to discover if and how the message has been disarmed. After the
test is complete, you can review your results and understand if you’re safe or if you
could be the victim of a future attack.
Over 90% of email traffic has spam, phishing, malware and other electronic threats
Email is the primary vector for delivering malware and ransomware
Average cost to a business due to a cyberattack
Do you need any further information before taking the test?
Why should I take the Test?
So you can discover where the holes and gaps are in your defences. Once you know where they are you can do something about it.
What's going to happen when I do this Test?
When you click on the Take the test button you simply add your email address and details to the tool. The test will send you 16 of the most common email threats that should be picked up by any credible email security solution. All threats have been disarmed and are safe to receive but will behave as if they are malicious.
What will the impact be on my network and resources?
The Test is non-intrusive and private, no client integration or installation is required. It's completely safe and will not disrupt operations. Minimal details are required to begin the test, so low impact on resources. The test is free and there's no obligation to buy anything.
What will the test show me?
You'll be emailed with a detailed report of what's been discovered. If a threat is present it will tell you how it should be stopped. If a threat has been correctly identified you will be informed that your existing email security solution is working ok.
Our email tests
Which email threats will be tested against your current email security solution?
1. Spoofed envelope sender
Email spoofing is the creation of email messages with a forged sender address. Hackers use this technique to launch a phishing attack on as many employees as possible.
2. HTML analysis
This email tests the ability of your Email Security Solution to detect threats in the message content. Some HTML tags are considered to be potentially dangerous to the extent that they can install ransomware.
3. Executable file
Most email providers don't allow you to send executable or ".exe" files. Most executable files are legitimate. However, some executable files are malicious and used to spread malware. Attached you'll find a widely well-known executable file, absolutely harmless, named putty.exe.
4. Virus attachment
This is a well-known code, known by all antivirus, which is used for the purpose of testing that the antivirus is functional and reacting to signature-based virus.
5. Outlook Conditional Comment
This email tests the ability of your email security solution to detect threats in the message content. Microsoft Outlook for Windows uses HTML comments as the conditional rendering engine. That means an attacker could exploit this feature by storing, for example, bad links in comments that are usually ignored by other email clients, targeting Microsoft Windows clients.
6. Malware URI
This email tests the ability of your Email Security Gateway to detect hidden malware URI's in realtime, so that 0-day and 0-hour threats can be blocked as soon as they are detected.
7. Zero Width Spaces link
The zero width space (ZWSPs) is an Unicode character. It's white space but renders with zero width. So you don't see it. This email tests the ability of your Email Security Gateway to detect zero width spaces (ZWSPs) used in links to bypass security features.
8. Base HTML Tag link
This email tests the ability of your Email Security Gateway to detect a vulnerability known as baseStriker that allows miscreants to send malicious emails that bypass security systems.
9. HTML JS Redirect Attachment
10. RFC-Abused HTML Attachment
A Request for Comments (RFC) is a formal document from the Internet Engineering Task Force (IETF) that are considered Internet standards. If your email script's coding is not RFC compliant, a mail servers should reject the email.
11. Active PDF
12. PDF with malicious text link
PDF files can contain text, images and links. Or.. what we call a text link, that is normal text pointing to a website. Adobe Reader (and possibly other readers) with the goal of making the life easier to users, automatically detects such text links making them active so you can just click on the link.
13. PDF with malicious link
Spammers increasingly use a PDF's ability to embed hyperlinks into documents so that recipients of malicious PDFs open malicious Web sites.
14. ZIP Archive with JS
15. MS Word Document with external contents
Using Microsoft documents to deliver a payload is as old as Office itself, and over the years many different attack vectors have been explored.
16. Business Email Compromise
Business Email Compromise (or Whaling) fraud is a phishing attack where the sender impersonates an executive (often the CEO), and they attempt to trick the victim into transferring funds or sensitive information.
17. MS Excel Document with formula macro function
Macro-formulas allow writing code by entering statements directly into cells, just like normal formulas. The macro-formulas that allow executing malicious code are named EXEC, RUN and CALL. Also indirect formula generation is possible through the FORMULA.FILL statement, which creates a formula by gathering data from lots of different cells and making some transformations.
"I would recommend Libraesva Email Security. The installation was simple, the day to day usage is easy to operate, the functionality offers a great deal of configuration options, and overall it offers great value for money."
Joel HarperWirral Metropolitan College
"We were impressed with the features and ease of use of Libraesva as soon as the evaluation started. The subsequent installation and go-live was very smooth and the quality of the support is very high."
"Libraesva brought down the cost of managing and maintaining of antispam solution, freeing up resources to be able to allocate to new projects."