How to send free fake mails to anyone/ Email Spoofing


Summary: Even now and then you all wanted to send a fake mail to your friends and family members. Lets see, how this works and how to send free fake email to anyone.

Spoofing is a technique of hiding your own identity from others. It can be of any type, like Mobile number spoofing, email spoofing, and many others such way. This technique is basically used by spammers to generate fake mail-id’s. In Email spoofing, we generally hide our own email-id, so that the receiving person might think that it has generated from other source.
Lets take an example, if a person A wants to send a fake mail to person B, but he doesn’t want to show his email-id, and then he can use person C or D’s email id.

You can use the following site for sending free fake mails –

Sendmail

email spoofing : sendmail

email spoofing : send free fake mail to anyone
http://sendmail.thegeoadventure.com/
Use this site just for fun.
DISCLAIMER: do not use this site for sending any wrong material. As it will be your sole responsibility for any false message.

 

Email spoofing may occur in different forms, but all have a similar result: a user receives email that appears to have originated from one source when it actually was sent from another source. Email spoofing is often an attempt to trick the user into making a damaging statement or releasing sensitive information (such as passwords).

Examples of spoofed email that could affect the security of your site include:

  • email claiming to be from a system administrator requesting users to change their passwords to a specified string and threatening to suspend their account if they do not do this
  • email claiming to be from a person in authority requesting users to send them a copy of a password file or other sensitive information

Technical Issues

  • If you provide email services to your user community, your users are vulnerable to spoofed or forged email.
  • It is easy to spoof email because SMTP (Simple Mail Transfer Protocol) lacks authentication. If a site has configured the mail server to allow connections to the SMTP port, anyone can connect to the SMTP port of a site and (in accordance with that protocol) issue commands that will send email that appears to be from the address of the individual’s choice; this can be a valid email address or a fictitious address that is correctly formatted.
  • In addition to connecting to the SMTP port of a site, a user can send spoofed email via other protocols (for instance, by modifying their web browser interface).

 

What You Can Do

 

  • Reaction

  1. You may be alerted to spoofed email attempts by reports from your users or by investigating bounced email error messages.
  2. Following relevant policies and procedures of your organization, review all information (such as mail headers and system log files) related to the spoofed email.Examine tcp_wrapper, ident, and sendmail logs to obtain information on the origin of the spoofed email.The header of the email message often contains a complete history of the “hops” the message has taken to reach its destination. Information in the headers (such as the “Received:” and “Message-ID” information), in conjunction with your mail delivery logs, should help you to determine how the email reached your system.If your mail reader does not allow you to review these headers, check the ASCII file that contains the original message.

    NOTE: Some of the header information may be spoofed; and if the abuser connected directly to the SMTP port on your system, it may not be possible for you to identify the source of the activity.

  3. Follow up with other sites involved in this activity, if you can identify the sites. Contact them to alert them to the activity and help them determine the source of the original email.We would appreciate a cc to “cert@cert.org” on your messages; this facilitates our work on incidents and helps us relate ongoing intruder activities.If you have a CERT# reference for this incident, please include it in the subject line of all messages related to this incident. (NOTE: This reference number will be assigned by the CERT/CC, so if you do not have a reference number, one will be assigned once we receive the incident report.)
  4. To provide as much information as possible to help trace this type of activity, you can increase the level of logging for your mailer delivery daemon.
  5. Realize that in some cases, you may not be able to identify the origin of the spoofed email.

  • Prevention (Deterrence)

  1. Use cryptographic signatures (e.g., PGP “Pretty Good Privacy” or other encryption technologies) to exchange authenticated email messages. Authenticated email provides a mechanism for ensuring that messages are from whom they appear to be, as well as ensuring that the message has not been altered in transit. Similarly, sites may wish to consider enabling SSL/TLS in their mail transfer software. Using certificates in this manner increases the amount of authentication performed when sending mail.
  2. Configure your mail delivery daemon to prevent someone from directly connecting to your SMTP port to send spoofed email to other sites.
  3. Ensure that your mail delivery daemon allows logging and is configured to provide sufficient logging to assist you in tracking the origin of spoofed email.
  4. Consider a single point of entry for email to your site. You can implement this by configuring your firewall so that SMTP connections from outside your firewall must go through a central mail hub. This will provide you with centralized logging, which may assist in detecting the origin of mail spoofing attempts to your site.
  5. Educate your users about your site’s policies and procedures in order to prevent them from being “social engineered,” or tricked, into disclosing sensitive information (such as passwords). Have your users report any such activities to the appropriate system administrator(s) as soon as possible. See also CERT advisory CA-1991-04, available from

 

Source : http://www.cert.org/tech_tips/email_spoofing.html

Thanks for reading. hope it might helped you.
http://ehack.thegeoadventure.com/

Advertisements

Posted on December 22, 2012, in cyber crime, hacking, phishing, security and tagged , , , , . Bookmark the permalink. 8 Comments.

  1. I was able to find good advice from your articles.

  2. Hi friends, its fantastic post on the topic of cultureand fully explained, keep it up all the time.

  3. Thanks for sharing such a good idea, post is fastidious, thats why i have read it entirely

  4. I pay a visit each day a few sites and blogs to read articles, except this webpage offers quality based
    content.

  5. i was very pleased to find this site. i wanted to thank you for this great read!! i am definitely enjoying every little bit of it and i have you bookmarked to check out new stuff you post.

  6. this subject is a lot interesting, it would help me so much.

  7. Woah! I’m really loving the template/theme of this site. It’s simple,
    yet effective. A lot of times it’s very difficult to get that “perfect balance” between usability and visual appeal. I must say that you’ve done
    a superb job with this. In addition, the blog loads extremely quick for me on
    Safari. Superb Blog!

  8. Howdy just wanted to give you a brief heads up and let you know a few of the
    images aren’t loading correctly. I’m not sure why but I think its a linking issue.
    I’ve tried it in two different internet browsers and both show the same results.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: