CNT4704: Analysis of Computer Communication Networks
Fall 2013
Lab assignment 2: Manually send a spam email (Due
Sept. 30th midnight via WebCourse and email)
In this simple assignment, you will need
to use telnet to manually send a spam (faked) email to this
account "ucf.cnt4704@gmail.com". From this experiment, you will
understand why there are so many untrusted email around and how
easy for attackers to send out spam or phishing email. Due to
our department email server's security policy, if you use our
department email server for this email-sending task, you need to
first SSH to eustis.eecs.ucf.edu, and then do the telnet
interaction on eustis machine.
Please follow the in-class illustration to send this faked email. In order to make these assignment email not be treated as the other spam email, you must follow the following specifications:
1. The sender email must be "fake@". This should appear in the "from: ...." line inside the DATA command. You can use any domain name in the sender email address (but do not use cs.ucf.edu, longwood.cs.ucf.edu, or eecs.ucf.edu).
2. The email must have a subject line as "CNT4704: firstname lastname". Put your name in the subject line so that you can be credited.
3. Put in some words in the content. Must be at least two lines.
You can type in two "rcpt to:" to include your own real
email address for verification to check whether your email has
sent out successfully or not. Note that your email server might
put this email in its Spam folder.
What to Submit:
1. You need to send this spam email by Sept. 30th
midnight.
2. You need to submit an assignment report
via webCourse. In this report, you MUST include the
image of SCREEN COPY of your command shell window. The screen
copy should clear show what you typed and what the
email server responded.
In some case I may not be able to receive your spam email,
but I will still give you full credit if your report shows that
you have used telnet correctly in manual email sending. Some
students can use their ISP's email servers for this task as
well.