Jump to content
LeVeL23HackTools
  • Sign Up
Sign in to follow this  
dEEpEst

E-mail spoofing

Recommended Posts

WARNING! 
This tutorial is only intended for educational purposes. It is strictly forbidden to use the tutorial and the information in this tutorial for other (illegal) purposes.It is only allowed to use and / or apply the information from this tutorial if all parties involved have given permission for this. It is strictly forbidden to use the information from this tutorial on equipment (and other property) of other people without these people having given permission. 
HackFlag, the owner / founder of HackFlag, the board of HackFlag and myself are under no circumstances liable for any damage in any form that may be incurred in the use of (the information from) this tutorial. If it appears that you have misused this information you can be suspended from HackFlag. 


I'm going to talk about E-mail spoofing. 
Always wanted to send an E-mail through someone else's E-mail? 
This is possible! 
This does not happen, It looks like it's from that other person's E-Mail. 

Here is a short explanation of what Spoofing exactly means: 


Spoofing is the forging of features with the aim of temporarily assuming a false identity. This can for example be e-mail, website, IP address and biometric features. 

Email Spoofing: 

E-mail spoofing is a term used to describe fraudulent e-mail activities. These activities involve changing specific properties of the e-mail message, such as From (From), Return-Path (Sender) and Reply-To (Reply to). This makes it seem like the e-mail comes from another source. E-mail spoofing is a common technique for sending spam. 

There are also computer viruses that use e-mail spoofing to spread themselves. The virus uses a different address that it found on the infected computer as the sender. In some cases, the virus itself also creates an e-mail address. Yaha.E is not the first virus that falsifies the sender. The Klez.H virus even did so structurally and is therefore difficult to combat to date. People whose computer is infected can be difficult to be alerted because their email address is unknown to most recipients. 


Okay, how are we going to do this? 

This time we are just looking for a website that can do this for us, 

Go to 

Hidden Content

    Give reaction to this post to see the hidden content.
 

Hidden Content

    Give reaction to this post to see the hidden content.


Here we type in: 
Email Spoofer 

Hidden Content

    Give reaction to this post to see the hidden content.


We just grab the first one, In my case this is Emkei's Instant Mailer, I use this Self too. 

Hidden Content

    Give reaction to this post to see the hidden content.


If you click on it, we will come here: 

Hidden Content

    Give reaction to this post to see the hidden content.


Here we will fill in all information, 

Hidden Content

    Give reaction to this post to see the hidden content.


I will briefly describe what I have entered here: 

From Name: This is the name of the so-called sender, This sees the recipient. 

From E-mail: This is the E-mail where the e-mail comes from, the recipient sees this. So you can also take another man's E-mail, for example. 

To: This is the E-mail where you send the e-mail to, This is the recipient. 

Subject: Here you indicate the subject / title 

Attachments: Here you can add Images 

Content type: Which type of text you want to use 

Text: The text you want to send 

Captcha: This is just a security, just fill it out. Is always different 

Hidden Content

    Give reaction to this post to see the hidden content.


And then you press send !! 

And then there is this: 

Hidden Content

    Give reaction to this post to see the hidden content.


Congratulations, you have successfully sent your fake E-mail !! 

I hope you have done something about this, some will already know this. 
But is it always fun for the one who did not know this yet, and maybe it was necessary? 

Tjauw luitjes, Have a nice day !!

  • Like 3
  • Thanks 3
  • Haha 1

Share this post


Link to post
Share on other sites
Guest
This topic is now closed to further replies.
Sign in to follow this  

  • Similar Content

    • By dEEpEst
      hoy aprenderá cómo crear un archivo que explote la vulnerabilidad de la Trayectoria transversal del archivador WinRAR hasta la versión 5.61 inclusive . Esta vulnerabilidad ha recibido los identificadores CVE-2018-20250, CVE-2018-20251, CVE-2018-20252 y CVE-2018-20253. 

      Quienes estén interesados en los detalles pueden leer este artículo:
      Hidden Content
      Give reaction to this post to see the hidden content. La vulnerabilidad permite forzar la colocación de un archivo en una ruta específica. Para un ataque exitoso, un atacante solo necesita convencer a la víctima para que desempaquete el archivo malicioso usando WinRAR. 

      Para el trabajo necesitamos python3. Descargue el archivo (adjunto al artículo), descomprímalo. 
      A continuación estamos interesados en winrar_exp.py
       
        Hidden Content
      Give reaction to this post to see the hidden content.

      Podemos cambiar los valores rar_filename, evil_filename, target_filename, filename_list 

      rar_filename - el nombre del archivo rar resultante 
      evil_filename - el nombre del archivo (payload) que pondremos en la carpeta que necesitamos debido a la vulnerabilidad 
      target_filename - la ruta donde se ubicará nuestro evil_file (payload) 
      filename_list - una lista de archivos que se archivan en la forma habitual 

      Observación: target_filename en el ejemplo es la ruta relativa a la carpeta de inicio. Hay dos carpetas de inicio, una global para todos los usuarios y una inicial para un usuario específico. Si intentamos escribir el archivo en el global, UAC comenzará a pedir permiso para esta acción, por lo que necesitamos una carpeta para el usuario actual. Como es muy probable que no conozcamos el nombre de usuario, podemos esperar que la víctima descomprima el archivo en el escritorio o en la carpeta de descarga. La ruta anterior es válida para ellos. Si conoce el nombre de usuario, puede usar la ruta absoluta:
      Código: C:\C:C:\Users\<user name>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup Después de que haya editado el script por sí mismo, ejecútelo
      Python: python3 winrar_exp.py Capturas de pantalla que muestran el trabajo: 

      1. El trabajo del guión:
        Hidden Content
      Give reaction to this post to see the hidden content.

      2. El archivo en sí:
        Hidden Content
      Give reaction to this post to see the hidden content.

      3. Resultado del desembalaje:
       
        Hidden Content
      Give reaction to this post to see the hidden content.
       
        Hidden Content
      Give reaction to this post to see the hidden content.  
      Download:

      Hidden Content
      Give reaction to this post to see the hidden content.
    • By 1337day-Exploits
      Open-Xchange OX App Suite suffers from a content spoofing, cross site scripting, and information disclosure vulnerabilities. Versions affected vary depending on the vulnerability.

      Hidden Content
      Give reaction to this post to see the hidden content.
    • By Robypakez
      Hidden Content
      Give reaction to this post to see the hidden content.    
    • By dEEpEst

      Hidden Content
      Give reaction to this post to see the hidden content.
    • By dEEpEst

      Hidden Content
      Give reaction to this post to see the hidden content. ‼️ This is 1000% tested working even our student carded by this method.
×

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.