Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

 

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware,, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      E-mail spoofing

      1 post in this topic

      WARNING! 
      This tutorial is only intended for educational purposes. It is strictly forbidden to use the tutorial and the information in this tutorial for other (illegal) purposes.It is only allowed to use and / or apply the information from this tutorial if all parties involved have given permission for this. It is strictly forbidden to use the information from this tutorial on equipment (and other property) of other people without these people having given permission. 
      HackFlag, the owner / founder of HackFlag, the board of HackFlag and myself are under no circumstances liable for any damage in any form that may be incurred in the use of (the information from) this tutorial. If it appears that you have misused this information you can be suspended from HackFlag. 


      I'm going to talk about E-mail spoofing. 
      Always wanted to send an E-mail through someone else's E-mail? 
      This is possible! 
      This does not happen, It looks like it's from that other person's E-Mail. 

      Here is a short explanation of what Spoofing exactly means: 


      Spoofing is the forging of features with the aim of temporarily assuming a false identity. This can for example be e-mail, website, IP address and biometric features. 

      Email Spoofing: 

      E-mail spoofing is a term used to describe fraudulent e-mail activities. These activities involve changing specific properties of the e-mail message, such as From (From), Return-Path (Sender) and Reply-To (Reply to). This makes it seem like the e-mail comes from another source. E-mail spoofing is a common technique for sending spam. 

      There are also computer viruses that use e-mail spoofing to spread themselves. The virus uses a different address that it found on the infected computer as the sender. In some cases, the virus itself also creates an e-mail address. Yaha.E is not the first virus that falsifies the sender. The Klez.H virus even did so structurally and is therefore difficult to combat to date. People whose computer is infected can be difficult to be alerted because their email address is unknown to most recipients. 


      Okay, how are we going to do this? 

      This time we are just looking for a website that can do this for us, 

      Go to 

      Hidden Content

        Give reaction to this post to see the hidden content.
       

      Hidden Content

        Give reaction to this post to see the hidden content.


      Here we type in: 
      Email Spoofer 

      Hidden Content

        Give reaction to this post to see the hidden content.


      We just grab the first one, In my case this is Emkei's Instant Mailer, I use this Self too. 

      Hidden Content

        Give reaction to this post to see the hidden content.


      If you click on it, we will come here: 

      Hidden Content

        Give reaction to this post to see the hidden content.


      Here we will fill in all information, 

      Hidden Content

        Give reaction to this post to see the hidden content.


      I will briefly describe what I have entered here: 

      From Name: This is the name of the so-called sender, This sees the recipient. 

      From E-mail: This is the E-mail where the e-mail comes from, the recipient sees this. So you can also take another man's E-mail, for example. 

      To: This is the E-mail where you send the e-mail to, This is the recipient. 

      Subject: Here you indicate the subject / title 

      Attachments: Here you can add Images 

      Content type: Which type of text you want to use 

      Text: The text you want to send 

      Captcha: This is just a security, just fill it out. Is always different 

      Hidden Content

        Give reaction to this post to see the hidden content.


      And then you press send !! 

      And then there is this: 

      Hidden Content

        Give reaction to this post to see the hidden content.


      Congratulations, you have successfully sent your fake E-mail !! 

      I hope you have done something about this, some will already know this. 
      But is it always fun for the one who did not know this yet, and maybe it was necessary? 

      Tjauw luitjes, Have a nice day !!

      • Like 3
      • Thanks 3
      • Haha 1

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By dEEpEst

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst
          Hidden Content
          Give reaction to this post to see the hidden content.

          View File 12GB of Fake IDs & Tutorial Pack
          12GB of Fake IDs & Tutorial Pack

          Different Countries & Different Stuff. ( Indian Passports Too )
          Submitter dEEpEst Submitted 17/03/19 Category Files Password ********  
        • By dEEpEst
          12GB of Fake IDs & Tutorial Pack

          Different Countries & Different Stuff. ( Indian Passports Too )
        • By 1337day-Exploits
          The Windows registry editor allows specially crafted .reg filenames to spoof the default registry dialog warning box presented to an end user. This can potentially trick unsavvy users into choosing the wrong selection shown on the dialog box. Furthermore, we can deny the registry editor its ability to show the default secondary status dialog box (Win 10), thereby hiding the fact that our attack was successful.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe?
          The basic things you need to know is :
              Have patience , not everything will go perfect for the first time.
              Don't give up!
              Combo= email+password or user+password ( they usually come like this -> something@something.com:password or user:password
              Checker= a program that helps you check accs with whatever you want to check
              Dorks = dorks are the "Codes" that we will need to use later for sqli dumper so that we can get URLs and start getting private combos.
          To start cracking you will need
              Checkers     Dorks     Sqli dumper ( for me the best SQli dumper is 8.3 or 9.7)     An VPN for sqli dumper so that you can get many URLs
          Hidden Content
          Give reaction to this post to see the hidden content.