Email Security Tester
Over 90% of email traffic has spam, phishing, malware and other electronic threats. Email is the main infection vector for ransomware and malware. This tool tests if your email server is correctly configured to stop these common threats.
What's the Test?
It's an email pen test. It tests if your email server is correctly configured to stop these common threats.
Your security product should block, disarm or disinfect all samples sent to you.
Should some test emails reach your inbox, don't jump to conclusions — read the
email description to discover if and how the message has been disarmed. After the
test is complete, you can review your results and understand if you’re safe or if you
could be the victim of a future attack.
Over 90% of email traffic has spam, phishing, malware and other electronic threats
Email is the primary vector for delivering malware and ransomware
Average cost to a business due to a cyberattack
Do you need any further information before taking the test?
Why should I take the Test?
So you can discover where the holes and gaps are in your defences. Once you know where they are you can do something about it.
What's going to happen when I do this Test?
When you click on the Take the test button you simply add your email address and details to the tool. The test will send you 16 of the most common email threats that should be picked up by any credible email security solution. All threats have been disarmed and are safe to receive but will behave as if they are malicious.
What will the impact be on my network and resources?
The Test is non-intrusive and private, no client integration or installation is required. It's completely safe and will not disrupt operations. Minimal details are required to begin the test, so low impact on resources. The test is free and there's no obligation to buy anything.
What will the test show me?
You'll be emailed with a detailed report of what's been discovered. If a threat is present it will tell you how it should be stopped. If a threat has been correctly identified you will be informed that your existing email security solution is working ok.
Our email tests
Which email threats will be tested against your current email security solution?
Email spoofing is the creation of email messages with a forged sender address. Hackers use this technique to launch a phishing attack on as many employees as possible.
This email tests the ability of your Email Security Solution to detect threats in the message content. Some HTML tags are considered to be potentially dangerous to the extent that they can install ransomware.
Most email providers don't allow you to send executable or ".exe" files. Most executable files are legitimate. However, some executable files are malicious and used to spread malware. Attached you'll find a widely well-known executable file, absolutely harmless, named putty.exe.
This is a well-known code, known by all antivirus, which is used for the purpose of testing that the antivirus is functional and reacting to signature-based virus.
This email tests the ability of your email security solution to detect threats in the message content. Microsoft Outlook for Windows uses HTML comments as the conditional rendering engine. That means an attacker could exploit this feature by storing, for example, bad links in comments that are usually ignored by other email clients, targeting Microsoft Windows clients.
This email tests the ability of your Email Security Gateway to detect hidden malware URI's in realtime, so that 0-day and 0-hour threats can be blocked as soon as they are detected.
The zero width space (ZWSPs) is an Unicode character. It's white space but renders with zero width. So you don't see it. This email tests the ability of your Email Security Gateway to detect zero width spaces (ZWSPs) used in links to bypass security features.
This email tests the ability of your Email Security Gateway to detect a vulnerability known as baseStriker that allows miscreants to send malicious emails that bypass security systems.
A Request for Comments (RFC) is a formal document from the Internet Engineering Task Force (IETF) that are considered Internet standards. If your email script's coding is not RFC compliant, a mail servers should reject the email.
PDF files can contain text, images and links. Or.. what we call a text link, that is normal text pointing to a website. Adobe Reader (and possibly other readers) with the goal of making the life easier to users, automatically detects such text links making them active so you can just click on the link.
Spammers increasingly use a PDF's ability to embed hyperlinks into documents so that recipients of malicious PDFs open malicious Web sites.
Using Microsoft documents to deliver a payload is as old as Office itself, and over the years many different attack vectors have been explored.
Business Email Compromise (or Whaling) fraud is a phishing attack where the sender impersonates an executive (often the CEO), and they attempt to trick the victim into transferring funds or sensitive information.
Macro-formulas allow writing code by entering statements directly into cells, just like normal formulas. The macro-formulas that allow executing malicious code are named EXEC, RUN and CALL. Also indirect formula generation is possible through the FORMULA.FILL statement, which creates a formula by gathering data from lots of different cells and making some transformations.