Results 1 to 7 of 7

Thread: Messing around with Fake Emails

  1. #1
    Join Date
    Apr 2002

    Messing around with Fake Emails

    Introduction to Telnet

    On this page I will show you how to fake e-mail. Now I know what you are thinking, This guy is just copying an article from the "happy hacker". I am doing no such thing. There is nothing here that is copied. If you are running any Windows operating system past 98 you should have no problem doing this. Make sure you are connected to the internet. First thing open an MS-Dos window if you are running 98/me. If you are using NT/2000/XP open up command prompt. After opening up that window type in:

    telnet mail.geocities.com 25

    I have found this article to be interesting and was wondering if anyone could NOT telnet to that ip addy, and if someone knows the reason behind why you can't, I'd love the explanation!

    THANKS! =)


  2. #2
    Flash M0nkey
    Join Date
    Sep 2001
    [sarcasm]wow thanks cause that was so i depth and informative[/sarcasm]


  3. #3
    Join Date
    Jun 2002
    i'm assuming that you mean that you just telnet to port 25 and then use the:

    MAIL FROM: <crap@microcrap.com>
    RCPT TO: <jojo@blahblahblah.com>
    blah blah
    blah blah

  4. #4
    Join Date
    Jun 2002
    why would you ever want or need to send a fake mail anyway??
    know how to sell your wares. intrinsic quality isnt enough. not everyone bites at substance or looks for inner value. people like to follow the crowd;they go someplace because they see other people do so. uniqueness appeals both to the taste and to the intellect.

  5. #5
    Senior Member
    Join Date
    Dec 2001
    Synaptic: You wouldn't want to send a fake mail, but make it look like it's from another addy, or a fake address. This could be useful in some things, I hear, but I can think of nothing where I'd use it myself. ::shrug::

  6. #6
    Junior Member
    Join Date
    May 2002
    Sorry, but what is a fake mail? Anyone can make up a little story and give me an example of a fake mail and purpose hereof? Ty.

  7. #7
    a fake e-mail is often used by hackers to get certain data that they need, I.E the e-mails headers, they use the fake address so that when they use the "bouncing" e-mail exploit, that the company that bounced doesn't mark their e-mail iddy/ip adress etc.. i hope this helpes

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts