Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      E-mail spoofing

      Recommended Posts

      Staff
      WARNING! 
      This tutorial is only intended for educational purposes. It is strictly forbidden to use the tutorial and the information in this tutorial for other (illegal) purposes.It is only allowed to use and / or apply the information from this tutorial if all parties involved have given permission for this. It is strictly forbidden to use the information from this tutorial on equipment (and other property) of other people without these people having given permission. 
      HackFlag, the owner / founder of HackFlag, the board of HackFlag and myself are under no circumstances liable for any damage in any form that may be incurred in the use of (the information from) this tutorial. If it appears that you have misused this information you can be suspended from HackFlag. 


      I'm going to talk about E-mail spoofing. 
      Always wanted to send an E-mail through someone else's E-mail? 
      This is possible! 
      This does not happen, It looks like it's from that other person's E-Mail. 

      Here is a short explanation of what Spoofing exactly means: 


      Spoofing is the forging of features with the aim of temporarily assuming a false identity. This can for example be e-mail, website, IP address and biometric features. 

      Email Spoofing: 

      E-mail spoofing is a term used to describe fraudulent e-mail activities. These activities involve changing specific properties of the e-mail message, such as From (From), Return-Path (Sender) and Reply-To (Reply to). This makes it seem like the e-mail comes from another source. E-mail spoofing is a common technique for sending spam. 

      There are also computer viruses that use e-mail spoofing to spread themselves. The virus uses a different address that it found on the infected computer as the sender. In some cases, the virus itself also creates an e-mail address. Yaha.E is not the first virus that falsifies the sender. The Klez.H virus even did so structurally and is therefore difficult to combat to date. People whose computer is infected can be difficult to be alerted because their email address is unknown to most recipients. 


      Okay, how are we going to do this? 

      This time we are just looking for a website that can do this for us, 

      Go to 

      Hidden Content

        Give reaction to this post to see the hidden content.
       

      Hidden Content

        Give reaction to this post to see the hidden content.


      Here we type in: 
      Email Spoofer 

      Hidden Content

        Give reaction to this post to see the hidden content.


      We just grab the first one, In my case this is Emkei's Instant Mailer, I use this Self too. 

      Hidden Content

        Give reaction to this post to see the hidden content.


      If you click on it, we will come here: 

      Hidden Content

        Give reaction to this post to see the hidden content.


      Here we will fill in all information, 

      Hidden Content

        Give reaction to this post to see the hidden content.


      I will briefly describe what I have entered here: 

      From Name: This is the name of the so-called sender, This sees the recipient. 

      From E-mail: This is the E-mail where the e-mail comes from, the recipient sees this. So you can also take another man's E-mail, for example. 

      To: This is the E-mail where you send the e-mail to, This is the recipient. 

      Subject: Here you indicate the subject / title 

      Attachments: Here you can add Images 

      Content type: Which type of text you want to use 

      Text: The text you want to send 

      Captcha: This is just a security, just fill it out. Is always different 

      Hidden Content

        Give reaction to this post to see the hidden content.


      And then you press send !! 

      And then there is this: 

      Hidden Content

        Give reaction to this post to see the hidden content.


      Congratulations, you have successfully sent your fake E-mail !! 

      I hope you have done something about this, some will already know this. 
      But is it always fun for the one who did not know this yet, and maybe it was necessary? 

      Tjauw luitjes, Have a nice day !!

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. This video is original content created by Apoorv Gupta(The Decent Coder).
          In this video, I have provided you with knowledge regarding how to perform "OSINT" on Instagram accounts using a tool named "OSINTGRAM". This tutorial is a part of ethical hacking playlist of mine and no offensive techniques are used in this video. The information gathered using this tool is publicly available information like info, number of followers etc. It just provides you with all the info in an elegant way out. Also, tell me if you want more ethical hacking and coding tutorials for free.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Dorking is the art of understanding and utilizing a search engine to emit the desired results. If I wanted to find a file on anonfile; I can go on Google and use this search query, inurl:anonfile.com + Target File. I can find a Tweet with the exact same syntax, and I can repeat this for almost any target that is at public discretion and isn’t banned from Google. Here we post one of the best dorking tutorial book.
          What is a Dork?
          A Dork is a search query that a search engine can read and interpret to provide the most precise URLs that correlate to that query.
          Why do we use Dorks?
          Cracking is, at its simplest form, finding basic, unprotected sites, compromising its security measures or lack of; exporting information of which is desired and then use them for other purposes. This is important because this next part will be complementary to our injection criteria.
          Chapters
              Chapter 1 : Dorking
                  What is a Dork?
                  Why do we use Dorks?
                  Forms
                  Keywords
                  Page Extensions
                      Files Page Types and Page Extensions
              Chapter 2 : Syntax (Google)
                  Quotation Syntax
                  Ordering & Capitalization
                      Ordering
                  Extended Search Operators Syntax
                      Search Operator List
                      Search Functions
              Chapter 3 : Let’s get Started
                  Basic Dorks
                  Complex Dorks
                  The Big Questions
                  How to make Dork Types
                  Keywords and Parameters
                  More Advanced Keywords
                  Parameters
                  Parameters Detailed
                      Testing Parameters
                  Parameter Methods
                  Advanced Dorking
              Chapter 4 : Syntax
                  Google Regex System
                  Regex Wildcards
                  Regex Groups
                  Regex Escape
                  GRS
                      Advanced Explanation and Usage for GRS
                      Wildcards
                  Regex Groups
                  Breaking Regex & Syntax
              Chapter 5 : Extensive Google Syntax
                  Basics and Rules
                  Testing Dorks
                  Regex Dorking
                  Targeting Parameters
                  Page Extensions | When to Target
                  Bypassing Google Bot-Detection
              Chapter 6 : Google Search Settings INURL
              Chapter 7 : Numeric Dorks
              Chapter 8 : Database Errors | Vulnerability Method
                  Most Known SQLi Error Vulnerability (Stupidity Error)
                  Less Known Error Dorking
                  True Error | Unsearched but Practical
              Chapter 9 : Stringed / Extended Dorks
                  Stringed Dorks
                  Extended Dorks
              Chapter 10 : Dork Types | The Right : The Wrong : And The Bullshit
              Chapter 11 : Google Search Exploits
                  Anti-Parameter Dorks
                  Comma Dorks
                  inurl: Spaces via Regex Exploit
              Chapter 12 : Dorking for Plugins and Drivers
              Chapter 13 : Email Access Dorks |Exposure | Psychographic
                  Psychographic Understanding
              Chapter 14 : Default Directory Dorks | Common Directory
              Chapter 15 : Bing vs Google
              Chapter 16 : Generating vs Handwriting
                  What are Generated Dorks?
                      Problem 1 | Mismatch Combinations
                      Problem 2 | Invalid Dorks (Killing Proxies)
                  Handwritten Dorks
                  What are Handwritten Dorks?
                  Problems
              Chapter 17 : Exploitation Targeting on Google
              Chapter 18 : Administrator Panel Targeting
              Chapter 19 : Bing A-Z
              Chapter 20 : Post SQLi Targeting
              Chapter 21 : LFI Targeting
              Chapter 22 : Public WWW | Vulnerability & Exploit Targeting
              Chapter 23 : Google vs Google API (Custom Search Engine)
              Chapter 24 : GitHub Dorking

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst
          C++ Tutorial for Complete Beginners. 
          🌀Getting Started
          🌀Basic Syntax
          🌀Subroutines Reusable Blocks of Code
          🌀Object Oriented Coding
          🌀Pointers and Memory
          🔗Link :

          Hidden Content
          Give reaction to this post to see the hidden content.