Jump to content

Welcome to LeVeL23HackTools

Welcome to LeVeL23HackTools, like most online communities you must register to view or post in our community, but don't worry this is a simple free process that requires minimal information for you to signup. Be apart of LeVeL23HackTools by signing in or creating an account.

  • Start new topics and reply to others
  • Subscribe to topics and forums to get email updates
  • Get your own profile page and make new friends
  • Send personal messages to other members.

Sign in to follow this  
dEEpEst

E-mail spoofing

Recommended Posts

WARNING! 
This tutorial is only intended for educational purposes. It is strictly forbidden to use the tutorial and the information in this tutorial for other (illegal) purposes.It is only allowed to use and / or apply the information from this tutorial if all parties involved have given permission for this. It is strictly forbidden to use the information from this tutorial on equipment (and other property) of other people without these people having given permission. 
HackFlag, the owner / founder of HackFlag, the board of HackFlag and myself are under no circumstances liable for any damage in any form that may be incurred in the use of (the information from) this tutorial. If it appears that you have misused this information you can be suspended from HackFlag. 


I'm going to talk about E-mail spoofing. 
Always wanted to send an E-mail through someone else's E-mail? 
This is possible! 
This does not happen, It looks like it's from that other person's E-Mail. 

Here is a short explanation of what Spoofing exactly means: 


Spoofing is the forging of features with the aim of temporarily assuming a false identity. This can for example be e-mail, website, IP address and biometric features. 

Email Spoofing: 

E-mail spoofing is a term used to describe fraudulent e-mail activities. These activities involve changing specific properties of the e-mail message, such as From (From), Return-Path (Sender) and Reply-To (Reply to). This makes it seem like the e-mail comes from another source. E-mail spoofing is a common technique for sending spam. 

There are also computer viruses that use e-mail spoofing to spread themselves. The virus uses a different address that it found on the infected computer as the sender. In some cases, the virus itself also creates an e-mail address. Yaha.E is not the first virus that falsifies the sender. The Klez.H virus even did so structurally and is therefore difficult to combat to date. People whose computer is infected can be difficult to be alerted because their email address is unknown to most recipients. 


Okay, how are we going to do this? 

This time we are just looking for a website that can do this for us, 

Go to 

Hidden Content

    Give reaction to this post to see the hidden content.
 

Hidden Content

    Give reaction to this post to see the hidden content.


Here we type in: 
Email Spoofer 

Hidden Content

    Give reaction to this post to see the hidden content.


We just grab the first one, In my case this is Emkei's Instant Mailer, I use this Self too. 

Hidden Content

    Give reaction to this post to see the hidden content.


If you click on it, we will come here: 

Hidden Content

    Give reaction to this post to see the hidden content.


Here we will fill in all information, 

Hidden Content

    Give reaction to this post to see the hidden content.


I will briefly describe what I have entered here: 

From Name: This is the name of the so-called sender, This sees the recipient. 

From E-mail: This is the E-mail where the e-mail comes from, the recipient sees this. So you can also take another man's E-mail, for example. 

To: This is the E-mail where you send the e-mail to, This is the recipient. 

Subject: Here you indicate the subject / title 

Attachments: Here you can add Images 

Content type: Which type of text you want to use 

Text: The text you want to send 

Captcha: This is just a security, just fill it out. Is always different 

Hidden Content

    Give reaction to this post to see the hidden content.


And then you press send !! 

And then there is this: 

Hidden Content

    Give reaction to this post to see the hidden content.


Congratulations, you have successfully sent your fake E-mail !! 

I hope you have done something about this, some will already know this. 
But is it always fun for the one who did not know this yet, and maybe it was necessary? 

Tjauw luitjes, Have a nice day !!

  • Like 3
  • Thanks 3
  • Haha 1

Share this post


Link to post
Share on other sites
Guest
This topic is now closed to further replies.
Sign in to follow this  

  • Similar Content

    • By dEEpEst
      Saefko Attack Systems the most advance RAT-BOT-AGENT ever created

      Hidden Content
      Give reaction to this post to see the hidden content.


      This is "a multi protocol multi operating system" remote administration tool , This is the first system to use three protocols establishing all time communication , there is four main thing this design provides that no other system provide first
      Unlimited number of machines to control. Extreme reliability. Android and Windows control at the same time. No port forwarding. No mysql.
      Hidden Content
      Give reaction to this post to see the hidden content.

      This project was designed to replace all RAT/BOTS that are made to control remote machine,the problem with all current RATS/BOTS that they are unreliable and limited , you cant in 99.9% of the time have more than 100 machine or victim due to self flooding , self flooding meaning when the client connect to the server directly "when the rat connect to the attacker pc through TCP" . When the number of connected clients increased this acte as flood attack, so you will be limited to some low number and you will end up with lagy unreliable connection to the target machines. That's from the side of TCP rats the other side is the http bots ,that use a remote server containing some php scripts and mysql server , this design can handle unlimited number of machines in theory , but the problem with this design is that you do not have a direct connection to the machine so you are limited to http tasks and this dose not give you much control so that was just a quick short overview on some of extreme problems that RATS/BOTS facing with current techs,in Saefko Attack Systems "SAS" you combining both of these types of connections and adding IRC Protocol to the mix you will end up with extremely reliable connection to the target machine,SAS will handle millions of connections with direct TCP communications established through IRC networks any time any place all wither.
       
      Fast Setup  
      Youtube : 
       
       
      Main Windows

      Hidden Content
      Give reaction to this post to see the hidden content.

      Hidden Content
      Give reaction to this post to see the hidden content.

      Hidden Content
      Give reaction to this post to see the hidden content.

       
      Public HTTP Tasks
      Hidden Content
      Give reaction to this post to see the hidden content.

       
      Windows Build
      Hidden Content
      Give reaction to this post to see the hidden content.
       
      Android Build
      Hidden Content
      Give reaction to this post to see the hidden content.

      Hidden Content
      Give reaction to this post to see the hidden content.


       
      Command And Control Sections

       
      Android Command And Control Sections

      Hidden Content
      Give reaction to this post to see the hidden content.
       
      Android IRC Commands  

      ANDROID COMMANDS [msg] Show toast message. [dexe] Download and execute a file in visible mode eg : 'dexe  Hidden Content
      Give reaction to this post to see the hidden content. '. [hdexe] Download and execute a file in hidden mode eg : 'dexe  Hidden Content
      Give reaction to this post to see the hidden content. '. [vistpage] Vist a webpage in visible mode eg : 'vistpage  Hidden Content
      Give reaction to this post to see the hidden content. '. [hvistpage] Vist a webpage in hidden mode eg : 'hvistpage  Hidden Content
      Give reaction to this post to see the hidden content. '. [snapshot] Get snapshot from camera eg : 'snapshot CAMERA_INDEX'. [ping] Ping the agent machine to check if still active. [location] Get geo location information based on 'ipinfo.com'. [flashon] Turn the dvice flash on. [flashoff] Turn the dvice flash on. [wakeup] Turn dvice screen on. [screenshot] Take a screenshot to from the target machine. GENERAL COMMANDS [clear] Clear the terminal. [opacity] Change the transparency of the terminal eg : 'opacity 0.4'. [myip] Show your public ip address that currently in use. [showtcpport] Show the public port used for TCP communications. [fontcolor] Change the font color eg : 'fontcolor #FFFFFF'. [ping] Ping the agent machine to check if still active. [info] Tells the agent to identify its machine and return short informations about it. [CTRL + C] CTRL + C to cancel any previous commands. [flashoff] Turn the dvice flash on. [cleanup] Close all windows that created by this control uint. [retcp] Order the TCP agent to reconnect , this command used in case of TCP connection is disconnected. [exit] Close the current agent window. Android TCP Commands
      Hidden Content
      Give reaction to this post to see the hidden content.
       
      Android Private HTTP Tasks
      Hidden Content
      Give reaction to this post to see the hidden content.


      HTTP Tasks Types
      Download And execute Show Message Box Visit Website Shell Commands  
      Now Windows Command And Control
      Hidden Content
      Give reaction to this post to see the hidden content.
       
      Windows IRC Commands
       

      WINDOWS COMMANDS [pwd] Show current directory. [screenshot] Take a screenshot to from the target machine. [opencd] Open cd rom. [closecd] Close cd rom. [ping] Ping the agent machine to check if still active. [camlist] Get a list of available camera devices. [snapshot] Get snapshot from camera eg : 'snapshot CAMERA_INDEX'. [location] Get geo location information based on 'ipinfo.com'. [opencd] Open cd rom. [keylogs] Get agent saved keylogs through HTTP drop point. [shell] Run shell commands. [dexe] Download and execute a file in visible mode eg : 'dexe  Hidden Content
      Give reaction to this post to see the hidden content. '. [hdexe] Download and execute a file in hidden mode eg : 'dexe  Hidden Content
      Give reaction to this post to see the hidden content. '. [vistpage] Vist a webpage in visible mode eg : 'vistpage  Hidden Content
      Give reaction to this post to see the hidden content. '. [hvistpage] Vist a webpage in hidden mode eg : 'hvistpage  Hidden Content
      Give reaction to this post to see the hidden content. '. [uninstall] Uninstall the agent completely from the target machine. GENERAL COMMANDS [clear] Clear the terminal. [opacity] Change the transparency of the terminal eg : 'opacity 0.4'. [myip] Show your public ip address that currently in use. [showtcpport] Show the public port used for TCP communications. [fontcolor] Change the font color eg : 'fontcolor #FFFFFF'. [ping] Ping the agent machine to check if still active. [info] Tells the agent to identify its machine and return short informations about it. [CTRL + C] CTRL + C to cancel any previous commands. [flashoff] Turn the dvice flash on. [cleanup] Close all windows that created by this control uint. [retcp] Order the TCP agent to reconnect , this command used in case of TCP connection is disconnected. [exit] Close the current agent window.

       
      Windows TCP Commands
      Hidden Content
      Give reaction to this post to see the hidden content.
       
      Windows Private HTTP Tasks
      Hidden Content
      Give reaction to this post to see the hidden content.


      HTTP Tasks Types
      Download And execute Show Message Box Visit Website Shell Commands  
      Download:
      Hidden Content
      Give reaction to this post to see the hidden content.
      Password:
      level23hacktools.com
       
       
      EDIT:
      New versión Cracked 

      Hidden Content
      Give reaction to this post to see the hidden content.
    • By dEEpEst
       
      Download:
      Hidden Content
      Give reaction to this post to see the hidden content.
      Password:
      level23hacktools.com
       
    • By dEEpEst

      Hidden Content
      Give reaction to this post to see the hidden content. Umbreon Rootkit
      ------------------------------------------------------------------------------------------------------------------------------
      You're Welcome Faggots!
      ------------------------------------------------------------------------------------------------------------------------------
      Dependencies: OpenSSL binaries, libs, headers (or a smart user)
      Password hashing format is Whirlpool. There's a tool included in utils.
      The installer actually uses this, but your mileage may vary compiling it
      on strange systems. If you run into issues just edit the installer script a bit.
      Bring a static-compiled pwgen and unfuck if you're desperate to get it working
      ------------------------------------------------------------------------------------------------------------------------------
      To use(Don't be stupid!)
      bash setup
      bash root.sh [USERNAME] [PASSWORD] - This will set the login to the rootkit user
      ------------------------------------------------------------------------------------------------------------------------------
      Extra Files:
      portchecker | checks specified port
      promptlog | successful SSH root passwords
      ------------------------------------------------------------------------------------------------------------------------------
      To Fix Server If #RIPed
      compile and run utils/unfuck.c
       
      Download:
      Hidden Content
      Give reaction to this post to see the hidden content.
      Password:
      level23hacktools.com
    • By dEEpEst
      Most routers have a default username and password. You can get an overview of all the commands used with Hydra by following: “man hydra” (in terminal).
      First, you’ll need to scan the open ports on the router.
      Use the following command: “namp 192.168.1.1” (this is your router’s IP address).
      I will use FTP here.
      Now, run the following command: “hydra -l admin -P password.txt -v -f  192.168.1.1 ftp”Explanation of the command: “l” is used for the login username. My default is “admin.” You can use “-L” and give a text file of some usernames if you’re not aware of your router’s admin username.
      “P” is used for the password list.
      “v” is used for verbose mode; it shows the login attempts.
      “f”  tells it to quit after getting the valid username and password pair once.
      “192.168.1.1” is my router’s configure IP address.
      “ftp” is the service which I am using to get an open port (you can also use “http-get” and others).
      Now wait and watch; if it gets a login password pair, then it will show you on the screen.
      There are many types of services which hydra supports and you can use them for cracking any type of login passwords.
      I’ve created a video on hydra that you can watch here:
       
       
×

Important Information

Terms of Service