Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      E-mail spoofing

      Recommended Posts

      Staff
      WARNING! 
      This tutorial is only intended for educational purposes. It is strictly forbidden to use the tutorial and the information in this tutorial for other (illegal) purposes.It is only allowed to use and / or apply the information from this tutorial if all parties involved have given permission for this. It is strictly forbidden to use the information from this tutorial on equipment (and other property) of other people without these people having given permission. 
      HackFlag, the owner / founder of HackFlag, the board of HackFlag and myself are under no circumstances liable for any damage in any form that may be incurred in the use of (the information from) this tutorial. If it appears that you have misused this information you can be suspended from HackFlag. 


      I'm going to talk about E-mail spoofing. 
      Always wanted to send an E-mail through someone else's E-mail? 
      This is possible! 
      This does not happen, It looks like it's from that other person's E-Mail. 

      Here is a short explanation of what Spoofing exactly means: 


      Spoofing is the forging of features with the aim of temporarily assuming a false identity. This can for example be e-mail, website, IP address and biometric features. 

      Email Spoofing: 

      E-mail spoofing is a term used to describe fraudulent e-mail activities. These activities involve changing specific properties of the e-mail message, such as From (From), Return-Path (Sender) and Reply-To (Reply to). This makes it seem like the e-mail comes from another source. E-mail spoofing is a common technique for sending spam. 

      There are also computer viruses that use e-mail spoofing to spread themselves. The virus uses a different address that it found on the infected computer as the sender. In some cases, the virus itself also creates an e-mail address. Yaha.E is not the first virus that falsifies the sender. The Klez.H virus even did so structurally and is therefore difficult to combat to date. People whose computer is infected can be difficult to be alerted because their email address is unknown to most recipients. 


      Okay, how are we going to do this? 

      This time we are just looking for a website that can do this for us, 

      Go to 

      Hidden Content

        Give reaction to this post to see the hidden content.
       

      Hidden Content

        Give reaction to this post to see the hidden content.


      Here we type in: 
      Email Spoofer 

      Hidden Content

        Give reaction to this post to see the hidden content.


      We just grab the first one, In my case this is Emkei's Instant Mailer, I use this Self too. 

      Hidden Content

        Give reaction to this post to see the hidden content.


      If you click on it, we will come here: 

      Hidden Content

        Give reaction to this post to see the hidden content.


      Here we will fill in all information, 

      Hidden Content

        Give reaction to this post to see the hidden content.


      I will briefly describe what I have entered here: 

      From Name: This is the name of the so-called sender, This sees the recipient. 

      From E-mail: This is the E-mail where the e-mail comes from, the recipient sees this. So you can also take another man's E-mail, for example. 

      To: This is the E-mail where you send the e-mail to, This is the recipient. 

      Subject: Here you indicate the subject / title 

      Attachments: Here you can add Images 

      Content type: Which type of text you want to use 

      Text: The text you want to send 

      Captcha: This is just a security, just fill it out. Is always different 

      Hidden Content

        Give reaction to this post to see the hidden content.


      And then you press send !! 

      And then there is this: 

      Hidden Content

        Give reaction to this post to see the hidden content.


      Congratulations, you have successfully sent your fake E-mail !! 

      I hope you have done something about this, some will already know this. 
      But is it always fun for the one who did not know this yet, and maybe it was necessary? 

      Tjauw luitjes, Have a nice day !!

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Chapters
              Chapter 1 : Dorking
                  What is a Dork?
                  Why do we use Dorks?
                  Forms
                  Keywords
                  Page Extensions
                      Files Page Types and Page Extensions
              Chapter 2 : Syntax (Google)
                  Quotation Syntax
                  Ordering & Capitalization
                      Ordering
                  Extended Search Operators Syntax
                      Search Operator List
                      Search Functions
              Chapter 3 : Let’s get Started
                  Basic Dorks
                  Complex Dorks
                  The Big Questions
                  How to make Dork Types
                  Keywords and Parameters
                  More Advanced Keywords
                  Parameters
                  Parameters Detailed
                      Testing Parameters
                  Parameter Methods
                  Advanced Dorking
              Chapter 4 : Syntax
                  Google Regex System
                  Regex Wildcards
                  Regex Groups
                  Regex Escape
                  GRS
                      Advanced Explanation and Usage for GRS
                      Wildcards
                  Regex Groups
                  Breaking Regex & Syntax
              Chapter 5 : Extensive Google Syntax
                  Basics and Rules
                  Testing Dorks
                  Regex Dorking
                  Targeting Parameters
                  Page Extensions | When to Target
                  Bypassing Google Bot-Detection
              Chapter 6 : Google Search Settings INURL
              Chapter 7 : Numeric Dorks
              Chapter 8 : Database Errors | Vulnerability Method
                  Most Known SQLi Error Vulnerability (Stupidity Error)
                  Less Known Error Dorking
                  True Error | Unsearched but Practical
              Chapter 9 : Stringed / Extended Dorks
                  Stringed Dorks
                  Extended Dorks
              Chapter 10 : Dork Types | The Right : The Wrong : And The Bullshit
              Chapter 11 : Google Search Exploits
                  Anti-Parameter Dorks
                  Comma Dorks
                  inurl: Spaces via Regex Exploit
              Chapter 12 : Dorking for Plugins and Drivers
              Chapter 13 : Email Access Dorks |Exposure | Psychographic
                  Psychographic Understanding
              Chapter 14 : Default Directory Dorks | Common Directory
              Chapter 15 : Bing vs Google
              Chapter 16 : Generating vs Handwriting
                  What are Generated Dorks?
                      Problem 1 | Mismatch Combinations
                      Problem 2 | Invalid Dorks (Killing Proxies)
                  Handwritten Dorks
                  What are Handwritten Dorks?
                  Problems
              Chapter 17 : Exploitation Targeting on Google
              Chapter 18 : Administrator Panel Targeting
              Chapter 19 : Bing A-Z
              Chapter 20 : Post SQLi Targeting
              Chapter 21 : LFI Targeting
              Chapter 22 : Public WWW | Vulnerability & Exploit Targeting
              Chapter 23 : Google vs Google API (Custom Search Engine)
              Chapter 24 : GitHub Dorking

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst
          Worm, Virus & Trojan Horse: Ethical Hacking Tutorial
          Some of the skills that hackers have are programming and computer networking skills. They often use these skills to gain access to systems. The objective of targeting an organization would be to steal sensitive data, disrupt business operations or physically damage computer controlled equipment. Trojans, viruses, and worms can be used to achieve the above-stated objectives.
          In this article, we will introduce you to some of the ways that hackers can use Trojans, viruses, and worms to compromise a computer system. We will also look at the countermeasures that can be used to protect against such activities.
          What is a Trojan horse?
          A Trojan horse is a program that allows the attack to control the user’s computer from a remote location. The program is usually disguised as something that is useful to the user. Once the user has installed the program, it has the ability to install malicious payloads, create backdoors, install other unwanted applications that can be used to compromise the user’s computer, etc.
          The list below shows some of the activities that the attacker can perform using a Trojan horse.
          Use the user’s computer as part of the Botnet when performing distributed denial of service attacks. Damage the user’s computer (crashing, blue screen of death, etc.) Stealing sensitive data such as stored passwords, credit card information, etc. Modifying files on the user’s computer Electronic money theft by performing unauthorized money transfer transactions Log all the keys that a user presses on the keyboard and sending the data to the attacker. This method is used to harvest user ids, passwords, and other sensitive data. Viewing the users’ screenshot Downloading browsing historyhistor What is a worm?
            A worm is a malicious computer program that replicates itself usually over a computer network. An attacker may use a worm to accomplish the following tasks;
          Install backdoors on the victim’s computers. The created backdoor may be used to create zombie computers that are used to send spam emails, perform distributed denial of service attacks, etc. the backdoors can also be exploited by other malware. Worms may also slowdown the network by consuming the bandwidth as they replicate. Install harmful payload code carried within the worm. What is a Virus?
            A virus is a computer program that attaches itself to legitimate programs and files without the user’s consent. Viruses can consume computer resources such as memory and CPU time. The attacked programs and files are said to be “infected”. A computer virus may be used to; Access private data such as user id and passwords Display annoying messages to the user Corrupt data in your computer Log the user’s keystrokes Computer viruses have been known to employ social engineering techniques. These techniques involve deceiving the users to open the files which appear to be normal files such as Word or Excel documents. Once the file is opened, the virus code is executed and does what it’s intended to do.
          Trojans, Viruses, and Worms counter measures
            To protect against such attacks, an organization can use the following methods. A policy that prohibits users from downloading unnecessary files from the Internet such as spam email attachments, games, programs that claim to speed up downloads, etc. Anti-virus software must be installed on all user computers. The anti-virus software should be updated frequently, and scans must be performed at specified time intervals. Scan external storage devices on an isolated machine especially those that originate from outside the organization. Regular backups of critical data must be made and stored on preferably read-only media such as CDs and DVDs. Worms exploit vulnerabilities in the operating systems. Downloading operating system updates can help reduce the infection and replication of worms. Worms can also be avoided by scanning, all email attachments before downloading them.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. What you'll learn
              We are also giving you study material as pdf in our course .
              The very latest up-to-date information and methods.
              Practical Ethical Hacking and Penetration Testing Skills
              Fun With Ethical Hacking Guide In Android Termux Tutorial
              A complete tutorial explaining how to build a virtual hacking environment, attack networks, and break passwords.
          Requirements
              Only Basic Knowledge About Internet & Android
              NO previous hacking knowledge required
          Description
          Welcome to my course Learn Ethical Hacking With Termux : Android Tutorial 2021.
          In this course you will learn how to Hack and Secure with termux with your Android device from scratch, you don't need to have any prior knowledge about Hacking,  Linux, Android and even Computers. This course is highly practical but it won't neglect the theory; we'll start with ethical hacking basics. In this course, you will learn the practical side of ethical hacking.This course is designed for everyone out there who want to learn how to learn ethical hacking in new and fun way with Android devices.
          This Course Includes Complete Termux Tutorials In Ethical Hacking & Information Security.
          Features :-
              It allow you to ssh your remote server via openssh.
              You can also ssh into your android devices from any remote system
              You could choose any shells such as BASH, ZSH AND FIST ETC
              You can choose different text editor such as emacs, nano. and vim to edit/ view files.
              Install any packages of your choice in your android devices using apt packages manager. up to date version of git, perl, python, ruby and node. js are all available.
              Connect your android device with a bluetooth, keyboard, mouse and external display and use it like a convergence device.
              Termux supports keyboard shortcuts.
              Termux allows you to run almost all GNU/ LINUX Commands.
          Important notice -
          We are also giving you study material as pdf in our course . you can download it when you enroll in our course.
          Who this course is for:
              Beginner students
              Students curious about Ethical Hacking and Information Security
              Anybody interested in learning how hackers hack the systems
              Person who want to learn ethical hacking with Termux.
              We are also giving you study material as pdf in our course . you can download it when you enroll in our course
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. In this video we're going to review the widely used tool: OllyDbg.
          Ollydbg is a tool for debugging used for binary code analysis. It converts the binary language to an assembly language.
          Assembly language is an ISA (Instruction Set Architecture) based low
          level language which is user friendly and has an efficient code. It is an
          application to figure out the bugs in a program, troubleshoot it and run
          specific parts of it and see how it works.
          We talk about Pros and Cons of OllyDbg, how to install it and it's uses.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.