Recent Articles
Email Spoofing
Saturday, December 24, 2011|
Surbhi Verma
Welcome to the era of trickery, where you may be able to trust your some friends, but can no longer trust their e-mails. Identity theft is quickly becoming the biggest issue when it comes to e-mail, and it has a name: e-mail spoofing.
Email spoofing is an act by which you can send mail pretending to come from any fake address( For example 'support@microsoft.com', 'admin@facebook.com' etc.). No matter if you have access to the sender address or not, even no matter if the sender address exists or not. It is a very common strategy used among hackers and spammers. It is becoming so common that you can no longer take for granted that the e-mail you are receiving is truly from the person identified as the sender.
Why Email Spoofing?
Senders do this for various reasons, including:
- The e-mail is spam and the sender doesn’t want to be subjected to anti-spam laws
- The e-mail contains a virus or Trojan and the sender believes you are more likely to open it if it appears to be from someone you know.
- Email contains a phishing page to hack your account.
- The e-mail requests information that you might be willing to give to the person the sender is pretending to be (for example, a sender might pose as your company’s system administrator and ask for your network password), as part of a “social engineering” attack.
- The sender is attempting to cause trouble for someone by pretending to be that person (for example, to make it look as though a political rival or personal enemy said something he/she didn’t in an e-mail message).
How does it work?
Email spoofing is done by altering the original 'sender email id', 'sender name' and other parts of the mail. This is possible because the Simple Mail Transfer Protocol (SMTP) does not support any type of sending authentication.
There are many ways to do so, some are as following:
1. Using Command prompt
2. Using email desktop services like Outlook
3. Using Websites offering mail spoofing
4. Using php scripts, to built own mail spoofing website.
I will write about all procedures in detail in coming posts, but here just providing names of some sites that offer mail spoofing, so that you can do some experiments and can understand about it. Some sites are:
1. http://emkei.cz/ (with advanced options)
2. http://deadfake.com/Send.aspx
Note: These sites are tested and working fine for gmail.
Examples of E-Mail Spoofing
Recently i have written about Adobe software update Fake mail, which is also an example of email spoofing.
Identifying Spoofed email:
One can do it by checking original header of email. Usually the spoofed email's header have an email address or SMTP address in sender email which is different than the email showing on the received mail. or it can have other website which has nothing to do with the sender id, or sometimes you can see the original email id of sender in 'reply to', if he/she is willing a reply from you .
Posted in
Hacking Stuff
4 comments for this post
Leave a reply
Subscribe to:
Post Comments (Atom)
TechByte4U on Facebook
Popular Posts
Free winrar, Full version Winrar, Winrar Serial key I guess everyone know what is Winrar, and what it works. So without going into t...
Before writing more about hacking, i was thinking to let the innocent people know about hacking and how hackers perform their hacking o...
Hello friends, Today i am gonna provide you genuine keys for windows 7. People who dont know how to how to make your window genuine by repla...
Hey Friends, Today's Topic will tell you How to access and control a PC remotely..... It happens many times with me that i miss ...
free idm, serial key Internet Download Manager(also known as Idman) is an excellent internet download accelerator that will care of...
Friends, if you don’t have a cam and you Have a desire to do Cam 2 Cam chat or can say video chat, then you have no need to buy a web cam. H...
In response to query asked by Ameer Hasan Malik Did you forget your windows login password? or want to access Admin account in schoo...
Google Chrome was one of the first browsers to have multiple processes . If you are a frequent Google Chrome user, then you probabel...
Dear All, Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords ...
Hey Friends, Download Paid version of AVG 9.0 antivirus for free with 8 yeas licence and save $240...... Features of AVG paid ve...
Nitin Bansal
January 10, 2012 at 8:25 AM
can u gv me the php script of the above trick...and pls tel me where do u live?
senthil
January 11, 2012 at 12:54 PM
your looking too beautifull
Udip Sedhain
March 2, 2012 at 7:48 PM
Hoping to see the detail article on this soon
Minhaj
April 15, 2012 at 4:39 PM
ttest