-- Preface --
Fakemail or commonly called a "fake email" is the email sent by someone to another orng using false identities. Ordinary Fakemail sent by utilizing the Open Relay SMTP Server. Maybe you've received an email with a unique domain address such as: me@anywhere.com, I@Love.you c@ke.p or even sender address is the address of your own and not infrequently terdisplay [nobody] (this is because the sender does not From filling out the form.) The scope of our discussion this time is:
I. What is the purpose to send Fakemail and what dangers?
II. How do I send Fakemail?
III. How do I distinguish between Fakemail and not Fakemail (original email)?
//--- Discussion --- /
I. What is the purpose to send Fakemail and what dangers?
1. Just For Fun
This is often done by others to provide a kind of "surprize" to his friends, apalgi the victim is a person who does not really understand the ins and outs of the internet and the world of Anonymity. Most of the perpetrators are young men who (probably) less work (without purpose bermanfat).
2. Social Engineering
Attackers often use fakemail to perform social engineering (social engineering) in order to gather information about the victim. This is bad for them is pncurian password and password takeover.
3. Causing Mailing List
In a mailing list is not rare difference of opinion or thought. Often found several members yng perkatan felt offended by other members who judged "harsh". Here Fakemail role, we URLs member who was hurt was a Lamer:
1. Lamer noted the name of one member on the mailing list.
2. He then did a post with another member's name with dirty words.
3. Lamer note address emposting moderators and dirty words anymore.
4. Chaos-chaos and slander on the mailing list.
5. Members of other individuals will on leaving out the mailing list.
6. Mailing ruined!
4. Promotion ----> (Spamming)
Within one year this has been filtering Yahoo.com reported more than 2 Billion Spam. Junk emails are often sent by a company or owner of a site specific service providers to promote its product.
5. Grudges or feeling dissatisfied
Squabbles in cyberspace often happens in IRC channels. Not infrequently because they feel offended happen Cyber warfare. Sometimes a chatter was a coward that dare not use the original email address to berate and terrorize his victim.
6. Virus Spreading
It is often found in a well-known VX who want the virus. Because maybe shy and for the sake of security credentials, he spread the virus (manually) to large mailing lists using a fake identity.
7. ... ... (Fill it yourself ...: P)
II. How do I send Fakemail?
1. Utilizing TELNET
Consider the following example ... ....
Click START - RUN and type TELNET
==============================
C: \ WINDOWS \ Ssytem32 \ telnet.exe
==============================
Welcome to Microsoft Telnet Client
Escape Character is 'CTRL + J'
Microsoft Telnet>
---> Type 'o' = To connect to the server in question.
<To>
---> Type 'mail.terserah.com 25' = mail server is
<To> mail.terserah.com 25
Connecting To mail.terserah.com ...
Connected ...
Mail.terserah.com is xxx.xxx.xxx
---> Type 'helo mail.terserahkamu.com'
Helo mail.terserahkamu.com pleased to meet you
---> Type 'mail from': (name of victim) @ terserah.com '= Examples of' mail from:
anyone@anywhere.com '.
OK
---> Type 'rctp to': (name of the victim) @ terserah.com '= Sample' rcpt
to: korban@terserah.com '.
OK
---> Type 'Subject:' = contents subjectnya
---> Type 'From:' = fill up your name, example: Spyro <anyone@anywhere.com>
---> Type 'X-Mailer:' = write mailers, such as: Micorosft outlook = So that if the victim merply your letter, a letter will be returned.
---> Type the message ...
Balablabla ...
From,
El Azizy ...
---> Click enter 2x to end email
Send 37368232982, OK
---> Type 'Quit' = Disconnect from the mail server
2. Using the sendmail function in PHP
PHP sendmail function that allows us to send email without MYSQL. We are just now looking for domain hosting that allows PHP scripts. Here's an example PHP script sending Fakemail (Fakemail.php):
<? Php
fakemail function ($ ANZ, $ anzname, $ anzdomain, $ anztld)
{
$ Alpha = array ('a', 'b', 'c', 'd', 'e', 'f', 'g', 'h', 'k', 'l', 'm', ' n ',' o ',' p ',' q ',' r ',' s', 't', 'u', 'v', 'w', 'x', 'y', 'z' );
$ At ='@';
$ Dot ='.';
$ Divstart = "<div style=\"display:none;\">";
$ Divende = "</ div>";
$ Name ='';
$ Domain ='';
$ Tld ='';
$ Mail = array ();
$ Block ='';
srand ((double) microtime () * 100000);
for ($ j = 0; $ j <$ ANZ; $ j + +)
{
for ($ i = 0; $ i <$ anzname; $ i + +)
{
$ Awert = rand (0.23);
$ Name .= $ alpha [$ awert];
}
for ($ i = 0; $ i <$ anzdomain; $ i + +)
{
$ Awert = rand (0.23);
$ Domain .= $ alpha [$ awert];
}
for ($ i = 0; $ i <$ anztld; $ i + +)
{
$ Awert = rand (0.23);
$ Tld .= $ alpha [$ awert];
}
$ Mails [$ j] = "<a href=\"mailto:".$name.$at.$domain.$dot.$tld."\">". $ Name. $ At. $ Domain. $ Dot . $ tld. "</ a> <br /> \ n";
$ Name ='';
$ Domain ='';
$ Tld ='';
}
for ($ k = 0; $ k <sizeof ($ mail); $ k + +)
{
$ Block .= $ email [$ k];
}
return $ divstart. $ block. $ divende;
}
/ / Aufruf für 10 Adressen,
/ / 6 Zeichen als Name,
/ / 8 Zeichen für den Domainnamen,
/ / Zeichen lange und 2 TLD
/ / Echo fakemail (10,6,8,2);
?>
3. Using the sender Fakemail
Many fake email sender application is available free (though no less well paid). We simply fill the form provided with the address of the SMTP server (there are hundreds of SMTP Open Relay is available free of charge!), Fill out the form From / Sender's up with your name, address of the victim, the attachment if available, fill in the message, then press the send button, easy enough is not it? Interested? Download the program in member area Category Mail Bomber (www.spyrozone.tk)
III. How do I distinguish between Fakemail and bukanFakemail (original email)?
We certainly have to be wary of emails that we receive fakemail in considering how dangerous a particular purpose. One way is to look at Full Headers email we receive (look for your own buttons in the mail.)
Consider a few examples below (here I use the example mail Yahoo!):
From Gin Mon Oct 25 17:13:47 2005
X-Apparently-To: spyro_zone@yahoo.com via 68,142,201,215; Tue, 25 Oct 2005 17:20:28 -0700
X-Originating-IP: [68.142.206.28]
Return-Path: <gin_2115@yahoo.com>
Authentication-Results: mta164.mail.re2.yahoo.com from = yahoo.com; DomainKeys = pass (ok)
Received: from 68.142.206.28 (HELO web32715.mail.mud.yahoo.com) (68.142.206.28) by mta164.mail.re2.yahoo.com with SMTP; Tue, 25 Oct 2005 17:20:28 -0700
Received: (qmail 21962 invoked by uid 60001); 26 Oct 2005 00:13:47 -0000
DomainKey-Signature: a = rsa-sha1; q = dns; c = nofws; s = s1024; d = yahoo.com; h = Message-ID: Received: Date: From: Reply-To: Subject: To: MIME- Version: Content-Type: Content-Transfer-Encoding: b = oyiXejXhE6hhm6epuyNImExh1e9tnmwB5Ru + WpH1 + Eukpjv + uJjPP5G6uK8oCmfpGV6PoO2Ow + wUUmE9oHo + 8qkP48J4env4pdhVlCRD6eZwNDuzGYUXJ9B5SONU4NSe + R7N8laptsvb GoermhyKRO c8Mtv77mAtYVPTXyOf4 +4 =;
Message-ID: <20051026001347.21960.qmail @ web32715.mail.mud.yahoo.com>
Received: from [202.6.237.138] by web32715.mail.mud.yahoo.com via HTTP; Fri, 26 Oct 2005 01:13:47 BST
Date: Wed, 26 Oct 2005 01:13:47 +0100 (BST)
From: Send an Instant Message "Gin" <gin_2115@yahoo.com> View Contact Details View Contact Details Add Mobile Alert
DomainKeys has confirmed Yahoo! That this message was sent by yahoo.com. Learn more
Reply-to: sx7@yahoo.com
Subject: Hi my friend ...
To: x7zone@yahoo.com
MIME-Version: 1.0
Content-Type: multipart / alternative; boundary = "0-610143512-1130285627 =: 19591"
Content-Transfer-Encoding: 8bit
Content-Length: 516
This original email!
GIN --- ---
From gin_2115@yahoo.com Mon Oct 25 16:45:46 2005
X-Apparently-To: spyro_zone@yahoo.com via 68.142.200.72; Tue, 25 Oct 2005 16:45:46 -0700
X-YahooFilteredBulk: 198.173.4.2
X-Originating-IP: [198.173.4.2]
Return-Path: <cluster1@diffusion.agava.com>
Authentication-Results: mta124.mail.dcn.yahoo.com from = yahoo.com; DomainKeys = neutral (no sig)
Received: from 198.173.4.2 (EHLO eternity.agava.net) (198.173.4.2) by mta124.mail.dcn.yahoo.com with SMTP; Tue, 25 Oct 2005 16:45:46 -0700
Received: from diffusion.agava.com (diffusion.agava.com [198.173.4.9]) by eternity.agava.net (Postfix) with ESMTP id 8E7E115311 for <spyro_zone@yahoo.com>; Tue, 25 Oct 2005 18:45 : 46 -0500 (CDT)
Received: by diffusion.agava.com (Postfix, from userid 4036) id 89768BC6011; Tue, 25 Oct 2005 18:45:46 -0500 (CDT)
To: x7_zone@yahoo.com
Subject: Hi Spyro ...
From: Send an Instant Message gin_2115@yahoo.com View Contact Details View Contact Details Add Mobile Alert
Reply-to: gin_2115@yahoo.com
Message-Id: <20051025234546.89768BC6011 @ diffusion.agava.com>
Date: Tue, 25 Oct 2005 18:45:46 -0500 (CDT)
Content-Length: 34
These fake emails!
GIN --- ---
Differentiate the second header of the email above ...!!
//---Closing ---//
A few from my brief discussion about Fakemail remember my limitations. Better to have a little knowledge but were divided than many but have eaten their own knowledge (basic stingy loe!: P) Hope can be used as material to learn for the newbie (hiks ... but I am also a newbie) and for the master to be used as a reference.
Fakemail or commonly called a "fake email" is the email sent by someone to another orng using false identities. Ordinary Fakemail sent by utilizing the Open Relay SMTP Server. Maybe you've received an email with a unique domain address such as: me@anywhere.com, I@Love.you c@ke.p or even sender address is the address of your own and not infrequently terdisplay [nobody] (this is because the sender does not From filling out the form.) The scope of our discussion this time is:
I. What is the purpose to send Fakemail and what dangers?
II. How do I send Fakemail?
III. How do I distinguish between Fakemail and not Fakemail (original email)?
//--- Discussion --- /
I. What is the purpose to send Fakemail and what dangers?
1. Just For Fun
This is often done by others to provide a kind of "surprize" to his friends, apalgi the victim is a person who does not really understand the ins and outs of the internet and the world of Anonymity. Most of the perpetrators are young men who (probably) less work (without purpose bermanfat).
2. Social Engineering
Attackers often use fakemail to perform social engineering (social engineering) in order to gather information about the victim. This is bad for them is pncurian password and password takeover.
3. Causing Mailing List
In a mailing list is not rare difference of opinion or thought. Often found several members yng perkatan felt offended by other members who judged "harsh". Here Fakemail role, we URLs member who was hurt was a Lamer:
1. Lamer noted the name of one member on the mailing list.
2. He then did a post with another member's name with dirty words.
3. Lamer note address emposting moderators and dirty words anymore.
4. Chaos-chaos and slander on the mailing list.
5. Members of other individuals will on leaving out the mailing list.
6. Mailing ruined!
4. Promotion ----> (Spamming)
Within one year this has been filtering Yahoo.com reported more than 2 Billion Spam. Junk emails are often sent by a company or owner of a site specific service providers to promote its product.
5. Grudges or feeling dissatisfied
Squabbles in cyberspace often happens in IRC channels. Not infrequently because they feel offended happen Cyber warfare. Sometimes a chatter was a coward that dare not use the original email address to berate and terrorize his victim.
6. Virus Spreading
It is often found in a well-known VX who want the virus. Because maybe shy and for the sake of security credentials, he spread the virus (manually) to large mailing lists using a fake identity.
7. ... ... (Fill it yourself ...: P)
II. How do I send Fakemail?
1. Utilizing TELNET
Consider the following example ... ....
Click START - RUN and type TELNET
==============================
C: \ WINDOWS \ Ssytem32 \ telnet.exe
==============================
Welcome to Microsoft Telnet Client
Escape Character is 'CTRL + J'
Microsoft Telnet>
---> Type 'o' = To connect to the server in question.
<To>
---> Type 'mail.terserah.com 25' = mail server is
<To> mail.terserah.com 25
Connecting To mail.terserah.com ...
Connected ...
Mail.terserah.com is xxx.xxx.xxx
---> Type 'helo mail.terserahkamu.com'
Helo mail.terserahkamu.com pleased to meet you
---> Type 'mail from': (name of victim) @ terserah.com '= Examples of' mail from:
anyone@anywhere.com '.
OK
---> Type 'rctp to': (name of the victim) @ terserah.com '= Sample' rcpt
to: korban@terserah.com '.
OK
---> Type 'Subject:' = contents subjectnya
---> Type 'From:' = fill up your name, example: Spyro <anyone@anywhere.com>
---> Type 'X-Mailer:' = write mailers, such as: Micorosft outlook = So that if the victim merply your letter, a letter will be returned.
---> Type the message ...
Balablabla ...
From,
El Azizy ...
---> Click enter 2x to end email
Send 37368232982, OK
---> Type 'Quit' = Disconnect from the mail server
2. Using the sendmail function in PHP
PHP sendmail function that allows us to send email without MYSQL. We are just now looking for domain hosting that allows PHP scripts. Here's an example PHP script sending Fakemail (Fakemail.php):
<? Php
fakemail function ($ ANZ, $ anzname, $ anzdomain, $ anztld)
{
$ Alpha = array ('a', 'b', 'c', 'd', 'e', 'f', 'g', 'h', 'k', 'l', 'm', ' n ',' o ',' p ',' q ',' r ',' s', 't', 'u', 'v', 'w', 'x', 'y', 'z' );
$ At ='@';
$ Dot ='.';
$ Divstart = "<div style=\"display:none;\">";
$ Divende = "</ div>";
$ Name ='';
$ Domain ='';
$ Tld ='';
$ Mail = array ();
$ Block ='';
srand ((double) microtime () * 100000);
for ($ j = 0; $ j <$ ANZ; $ j + +)
{
for ($ i = 0; $ i <$ anzname; $ i + +)
{
$ Awert = rand (0.23);
$ Name .= $ alpha [$ awert];
}
for ($ i = 0; $ i <$ anzdomain; $ i + +)
{
$ Awert = rand (0.23);
$ Domain .= $ alpha [$ awert];
}
for ($ i = 0; $ i <$ anztld; $ i + +)
{
$ Awert = rand (0.23);
$ Tld .= $ alpha [$ awert];
}
$ Mails [$ j] = "<a href=\"mailto:".$name.$at.$domain.$dot.$tld."\">". $ Name. $ At. $ Domain. $ Dot . $ tld. "</ a> <br /> \ n";
$ Name ='';
$ Domain ='';
$ Tld ='';
}
for ($ k = 0; $ k <sizeof ($ mail); $ k + +)
{
$ Block .= $ email [$ k];
}
return $ divstart. $ block. $ divende;
}
/ / Aufruf für 10 Adressen,
/ / 6 Zeichen als Name,
/ / 8 Zeichen für den Domainnamen,
/ / Zeichen lange und 2 TLD
/ / Echo fakemail (10,6,8,2);
?>
3. Using the sender Fakemail
Many fake email sender application is available free (though no less well paid). We simply fill the form provided with the address of the SMTP server (there are hundreds of SMTP Open Relay is available free of charge!), Fill out the form From / Sender's up with your name, address of the victim, the attachment if available, fill in the message, then press the send button, easy enough is not it? Interested? Download the program in member area Category Mail Bomber (www.spyrozone.tk)
III. How do I distinguish between Fakemail and bukanFakemail (original email)?
We certainly have to be wary of emails that we receive fakemail in considering how dangerous a particular purpose. One way is to look at Full Headers email we receive (look for your own buttons in the mail.)
Consider a few examples below (here I use the example mail Yahoo!):
From Gin Mon Oct 25 17:13:47 2005
X-Apparently-To: spyro_zone@yahoo.com via 68,142,201,215; Tue, 25 Oct 2005 17:20:28 -0700
X-Originating-IP: [68.142.206.28]
Return-Path: <gin_2115@yahoo.com>
Authentication-Results: mta164.mail.re2.yahoo.com from = yahoo.com; DomainKeys = pass (ok)
Received: from 68.142.206.28 (HELO web32715.mail.mud.yahoo.com) (68.142.206.28) by mta164.mail.re2.yahoo.com with SMTP; Tue, 25 Oct 2005 17:20:28 -0700
Received: (qmail 21962 invoked by uid 60001); 26 Oct 2005 00:13:47 -0000
DomainKey-Signature: a = rsa-sha1; q = dns; c = nofws; s = s1024; d = yahoo.com; h = Message-ID: Received: Date: From: Reply-To: Subject: To: MIME- Version: Content-Type: Content-Transfer-Encoding: b = oyiXejXhE6hhm6epuyNImExh1e9tnmwB5Ru + WpH1 + Eukpjv + uJjPP5G6uK8oCmfpGV6PoO2Ow + wUUmE9oHo + 8qkP48J4env4pdhVlCRD6eZwNDuzGYUXJ9B5SONU4NSe + R7N8laptsvb GoermhyKRO c8Mtv77mAtYVPTXyOf4 +4 =;
Message-ID: <20051026001347.21960.qmail @ web32715.mail.mud.yahoo.com>
Received: from [202.6.237.138] by web32715.mail.mud.yahoo.com via HTTP; Fri, 26 Oct 2005 01:13:47 BST
Date: Wed, 26 Oct 2005 01:13:47 +0100 (BST)
From: Send an Instant Message "Gin" <gin_2115@yahoo.com> View Contact Details View Contact Details Add Mobile Alert
DomainKeys has confirmed Yahoo! That this message was sent by yahoo.com. Learn more
Reply-to: sx7@yahoo.com
Subject: Hi my friend ...
To: x7zone@yahoo.com
MIME-Version: 1.0
Content-Type: multipart / alternative; boundary = "0-610143512-1130285627 =: 19591"
Content-Transfer-Encoding: 8bit
Content-Length: 516
This original email!
GIN --- ---
From gin_2115@yahoo.com Mon Oct 25 16:45:46 2005
X-Apparently-To: spyro_zone@yahoo.com via 68.142.200.72; Tue, 25 Oct 2005 16:45:46 -0700
X-YahooFilteredBulk: 198.173.4.2
X-Originating-IP: [198.173.4.2]
Return-Path: <cluster1@diffusion.agava.com>
Authentication-Results: mta124.mail.dcn.yahoo.com from = yahoo.com; DomainKeys = neutral (no sig)
Received: from 198.173.4.2 (EHLO eternity.agava.net) (198.173.4.2) by mta124.mail.dcn.yahoo.com with SMTP; Tue, 25 Oct 2005 16:45:46 -0700
Received: from diffusion.agava.com (diffusion.agava.com [198.173.4.9]) by eternity.agava.net (Postfix) with ESMTP id 8E7E115311 for <spyro_zone@yahoo.com>; Tue, 25 Oct 2005 18:45 : 46 -0500 (CDT)
Received: by diffusion.agava.com (Postfix, from userid 4036) id 89768BC6011; Tue, 25 Oct 2005 18:45:46 -0500 (CDT)
To: x7_zone@yahoo.com
Subject: Hi Spyro ...
From: Send an Instant Message gin_2115@yahoo.com View Contact Details View Contact Details Add Mobile Alert
Reply-to: gin_2115@yahoo.com
Message-Id: <20051025234546.89768BC6011 @ diffusion.agava.com>
Date: Tue, 25 Oct 2005 18:45:46 -0500 (CDT)
Content-Length: 34
These fake emails!
GIN --- ---
Differentiate the second header of the email above ...!!
//---Closing ---//
A few from my brief discussion about Fakemail remember my limitations. Better to have a little knowledge but were divided than many but have eaten their own knowledge (basic stingy loe!: P) Hope can be used as material to learn for the newbie (hiks ... but I am also a newbie) and for the master to be used as a reference.
0 komentar:
Speak up your mind
Tell us what you're thinking... !