-
June 15th, 2002, 02:38 AM
#1
Messing around with Fake Emails
Introduction to Telnet
On this page I will show you how to fake e-mail. Now I know what you are thinking, This guy is just copying an article from the "happy hacker". I am doing no such thing. There is nothing here that is copied. If you are running any Windows operating system past 98 you should have no problem doing this. Make sure you are connected to the internet. First thing open an MS-Dos window if you are running 98/me. If you are using NT/2000/XP open up command prompt. After opening up that window type in:
telnet mail.geocities.com 25
I have found this article to be interesting and was wondering if anyone could NOT telnet to that ip addy, and if someone knows the reason behind why you can't, I'd love the explanation!
THANKS! =)
-xposed
-
June 15th, 2002, 02:49 AM
#2
[sarcasm]wow thanks cause that was so i depth and informative[/sarcasm]
v_Ln
-
June 15th, 2002, 02:57 AM
#3
Member
i'm assuming that you mean that you just telnet to port 25 and then use the:
HELO
MAIL FROM: <crap@microcrap.com>
RCPT TO: <jojo@blahblahblah.com>
DATA
blah blah
blah blah
.
QUIT
-
June 15th, 2002, 03:33 AM
#4
Member
why would you ever want or need to send a fake mail anyway??
know how to sell your wares. intrinsic quality isnt enough. not everyone bites at substance or looks for inner value. people like to follow the crowd;they go someplace because they see other people do so. uniqueness appeals both to the taste and to the intellect.
-
June 15th, 2002, 03:46 AM
#5
Synaptic: You wouldn't want to send a fake mail, but make it look like it's from another addy, or a fake address. This could be useful in some things, I hear, but I can think of nothing where I'd use it myself. ::shrug::
-
June 15th, 2002, 07:15 AM
#6
Junior Member
Sorry, but what is a fake mail? Anyone can make up a little story and give me an example of a fake mail and purpose hereof? Ty.
-
June 15th, 2002, 08:01 AM
#7
a fake e-mail is often used by hackers to get certain data that they need, I.E the e-mails headers, they use the fake address so that when they use the "bouncing" e-mail exploit, that the company that bounced doesn't mark their e-mail iddy/ip adress etc.. i hope this helpes
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|