Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked E-mail spoofing


dEEpEst

Recommended Posts

WARNING! 
This tutorial is only intended for educational purposes. It is strictly forbidden to use the tutorial and the information in this tutorial for other (illegal) purposes.It is only allowed to use and / or apply the information from this tutorial if all parties involved have given permission for this. It is strictly forbidden to use the information from this tutorial on equipment (and other property) of other people without these people having given permission. 
HackFlag, the owner / founder of HackFlag, the board of HackFlag and myself are under no circumstances liable for any damage in any form that may be incurred in the use of (the information from) this tutorial. If it appears that you have misused this information you can be suspended from HackFlag. 


I'm going to talk about E-mail spoofing. 
Always wanted to send an E-mail through someone else's E-mail? 
This is possible! 
This does not happen, It looks like it's from that other person's E-Mail. 

Here is a short explanation of what Spoofing exactly means: 


Spoofing is the forging of features with the aim of temporarily assuming a false identity. This can for example be e-mail, website, IP address and biometric features. 

Email Spoofing: 

E-mail spoofing is a term used to describe fraudulent e-mail activities. These activities involve changing specific properties of the e-mail message, such as From (From), Return-Path (Sender) and Reply-To (Reply to). This makes it seem like the e-mail comes from another source. E-mail spoofing is a common technique for sending spam. 

There are also computer viruses that use e-mail spoofing to spread themselves. The virus uses a different address that it found on the infected computer as the sender. In some cases, the virus itself also creates an e-mail address. Yaha.E is not the first virus that falsifies the sender. The Klez.H virus even did so structurally and is therefore difficult to combat to date. People whose computer is infected can be difficult to be alerted because their email address is unknown to most recipients. 


Okay, how are we going to do this? 

This time we are just looking for a website that can do this for us, 

Go to 

This is the hidden content, please
 

This is the hidden content, please


Here we type in: 
Email Spoofer 

This is the hidden content, please


We just grab the first one, In my case this is Emkei's Instant Mailer, I use this Self too. 

This is the hidden content, please


If you click on it, we will come here: 

This is the hidden content, please


Here we will fill in all information, 

This is the hidden content, please


I will briefly describe what I have entered here: 

From Name: This is the name of the so-called sender, This sees the recipient. 

From E-mail: This is the E-mail where the e-mail comes from, the recipient sees this. So you can also take another man's E-mail, for example. 

To: This is the E-mail where you send the e-mail to, This is the recipient. 

Subject: Here you indicate the subject / title 

Attachments: Here you can add Images 

Content type: Which type of text you want to use 

Text: The text you want to send 

Captcha: This is just a security, just fill it out. Is always different 
This is the hidden content, please


And then you press send !! 

And then there is this: 

This is the hidden content, please


Congratulations, you have successfully sent your fake E-mail !! 

I hope you have done something about this, some will already know this. 
But is it always fun for the one who did not know this yet, and maybe it was necessary? 

Tjauw luitjes, Have a nice day !!

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.