telnet E-Mail spoofing
-
- n00b
- Posts: 5
- Joined: Sun Aug 01, 2004 12:33 am
- Location: INDIA
- Contact:
telnet E-Mail spoofing
Have you always wanted to send pepole anoying emails and you want them to blame it on a person you really h8? If so you must read this tutorial!. During this tutorial i will be spoofing a hotmail account.
Go to start then click on run and type in the following:
telnet mail.hotmail.com 25
then click on ok. Now a screen should pop up you might have to waight a few mins untill it connects, when it connects it will say somthing like this:
220 mc9-f16.hotmail.com Microsoft ESMTP MAIL Service, Version: 5.0.2195.6824 rea
dy at Sun, 27 Jun 2004 16:01:55 -0700
now just type in ehlo and hit enterand it will give you somthing like this:
250-mc9-f28.hotmail.com (02.04.01.0015) Hello [***.***.***.***]
250-SIZE 29696000
250-PIPELINING
250-8bitmime
250-BINARYMIME
250-CHUNKING
250-VRFY
250-AUTH LOGIN
250-AUTH=LOGIN
250-X-HMAUTH
250 OK
Now you have to choose a victim touse his E-Mail try this:
Mail From: redwizard1 (no hit enter)
if your spoofing a hotmail account you dont have to add @hotmail.com on the Mail From: section. (*Note that is a real hotmail account)
Now we have to choose a person to send the spoofed mail to try this:
RCPT TO: cheatkiller01@hotmail.com (hit enter)
(*note you have to add @hotmail.com when your adding the RCPT TO: command)
now we need to add the data to the E-Mail this is done by useing the DATA command:
DATA (hit enter)
now just type what ever you want here to send it just hit enter then hit . then hit enter again like this:
*************************************************************Life Is A Glitch And Then You Die
Go to start then click on run and type in the following:
telnet mail.hotmail.com 25
then click on ok. Now a screen should pop up you might have to waight a few mins untill it connects, when it connects it will say somthing like this:
220 mc9-f16.hotmail.com Microsoft ESMTP MAIL Service, Version: 5.0.2195.6824 rea
dy at Sun, 27 Jun 2004 16:01:55 -0700
now just type in ehlo and hit enterand it will give you somthing like this:
250-mc9-f28.hotmail.com (02.04.01.0015) Hello [***.***.***.***]
250-SIZE 29696000
250-PIPELINING
250-8bitmime
250-BINARYMIME
250-CHUNKING
250-VRFY
250-AUTH LOGIN
250-AUTH=LOGIN
250-X-HMAUTH
250 OK
Now you have to choose a victim touse his E-Mail try this:
Mail From: redwizard1 (no hit enter)
if your spoofing a hotmail account you dont have to add @hotmail.com on the Mail From: section. (*Note that is a real hotmail account)
Now we have to choose a person to send the spoofed mail to try this:
RCPT TO: cheatkiller01@hotmail.com (hit enter)
(*note you have to add @hotmail.com when your adding the RCPT TO: command)
now we need to add the data to the E-Mail this is done by useing the DATA command:
DATA (hit enter)
now just type what ever you want here to send it just hit enter then hit . then hit enter again like this:
*************************************************************Life Is A Glitch And Then You Die
- kka_kenny
- Your Senior
- Posts: 901
- Joined: Sat May 15, 2004 5:42 pm
- B-Con
- Challenge Winner [1x]
- Posts: 2679
- Joined: Thu Apr 22, 2004 4:19 pm
- Location: UC Davis
- Contact:
Um, I've never done this before, lack of interest I guess, but I figured I'd give it a shot....
I get down to the very end, but after I enter "rcpt to: e-mail" and hit <enter> the screen vanishes, leaving me no time to ever enter "data", and the address never get's an e-mail.....
I get down to the very end, but after I enter "rcpt to: e-mail" and hit <enter> the screen vanishes, leaving me no time to ever enter "data", and the address never get's an e-mail.....
- "Cryptographically secure linear feedback shift register based stream ciphers" -- a phrase that'll get any party started.
- Why know the ordinary when you can understand the extraordinary?
- Why know the ordinary when you can understand the extraordinary?
-
- Strike 1
- Posts: 62
- Joined: Wed Jun 30, 2004 4:54 pm
when i did it, it just closes but when i do start -->run-->command its says it cant connnect help?
h3ll0 3v3ry0n3
a Kewl Website
a Kewl Website
- GhostHawk
- Ex-Mod
- Posts: 1447
- Joined: Wed Jul 30, 2003 12:10 am
- Contact:
- B-Con
- Challenge Winner [1x]
- Posts: 2679
- Joined: Thu Apr 22, 2004 4:19 pm
- Location: UC Davis
- Contact:
He merely pointed out that this tutorial has been written alot before, he didn't say that your's sucked or anything....
And the picture was too big, he just beat me to asking you to change it......
And the picture was too big, he just beat me to asking you to change it......
Really? Sure looks like you changed it, not that the new one's any betterNo i wont get rid of my pic.
- "Cryptographically secure linear feedback shift register based stream ciphers" -- a phrase that'll get any party started.
- Why know the ordinary when you can understand the extraordinary?
- Why know the ordinary when you can understand the extraordinary?
- GhostHawk
- Ex-Mod
- Posts: 1447
- Joined: Wed Jul 30, 2003 12:10 am
- Contact:
cool dude wrote:ok i get stuck on the mail to and rcpt to part. i know u type mail from: blabla. but then were do i type rcpt to? and if its the next line how do i get to it without pressing enter?
Your supposed to hit Enter.
Opinions are like ass holes, everyone has one. It is also my opinion, that I am an ass hole.
-
- Banned
- Posts: 78
- Joined: Fri Aug 20, 2004 2:49 pm
- Location: pasadena
- UniX
- Veteran
- Posts: 600
- Joined: Thu Jun 26, 2003 1:17 pm
- Location: input("Why are you looking here?")
By blocking senders ip i take it that you want to spoof your ip from being seen by whoever you send the mail to. Weazy Tutorial gives a brief explanation on using proxies to do so in Genereal Tutorial section i think.
"UNIX is an operating system, OS/2 is half an operating system, Windows is a shell, and DOS is a boot partition virus." — Peter H. Coffin .
http://cybergotham.net
http://cybergotham.net