Methods to send fake EmailS

Share it Please


Open Relay Server
Web Scripts

Fake Emails: Open Relay Server
v An Open Mail Relay is an SMTP (Simple Mail Transfer Protocol) server configured in such a way that it allows
anyone on the Internet to send Email through it, not just mail destined ‘To’ or ‘Originating’ from known users.
v An Attacker can connect the Open Relay Server via Telnet and instruct the server to send the Email.
v Open Relay Email Server requires no password to send the Email.

Fake Emails: via web script
v Web Programming languages such as PHP and ASP contain the mail sending functions which can be used to send
Emails by programming Fake headers i.e.” From: To: Subject:”
v There are so many websites available on the Internet which already contains these mail sending scripts. Most of
them provide the free service.
v Some of Free Anonymous Email Websites are:


Ø Mail.Anonymizer.name (Send attachments as well)
Ø FakEmailer.net
Ø FakEmailer.info
Ø Deadfake.com

PHP Mail sending script

Consequences of fake emails
v Email from your Email ID to any Security Agency declaring a Bomb Blast can make you spend rest of your life behind the iron bars.
v Email from you to your Girl friend or Boy friend can cause Break-Up and set your friend’s to be in relationship.
v Email from your Email ID to your Boss carrying your Resignation Letter or anything else which you can think of.
v There can be so many cases drafted on Fake Emails.

Proving a fake Email
v Every Email carry Header which has information about the Travelling Path of the Email
v Check the Header and Get the location from the Email was Sent
v Check if the Email was sent from any other Email Server or Website
v Headers carry the name of the Website on which the mail sending script was used.

Email Bombing
v Email Bombing is sending an Email message to a particular address at a specific victim site. In many instances, the messages will be large and constructed from meaningless data in an effort to consume additional system and network resources. Multiple accounts at the target site may be abused, increasing the denial of service impact.

Email Spamming
v Email Spamming is a variant of Bombing; it refers to sending Email to hundreds or thousands of users (or to lists that expand to that many users). Email spamming can be made worse if recipients reply to the Email, causing all the original addressees to receive the reply. It may also occur innocently, as a result of sending a message to mailing lists and not realizing that the list explodes to thousands of users, or as a result of a responder message (such as vacation(1)) that is setup incorrectly.

Email Password Hacking
v There is no specified attack available just to hack the password of Email accounts. Also, it is not so easy to compromise the Email server like Yahoo, Gmail, etc.
v Email Password Hacking can be accomplished via some of the Client Side Attacks. We try to compromise the user and get the password of the Email account before it reaches the desired Email server.
v We will cover many attacks by the workshop flows, but at this time we will talk about the very famous 'Phishing attack'.

Phishing
v The act of sending an Email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.
v The Email directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is Bogus and set up only to steal the User’s information.


Phishing scams could be
v Emails inviting you to join a Social Group, asking you to Login using your Username and Password.
v Email saying that Your Bank Account is locked and Sign in to Your Account to Unlock IT.
v Emails containing some Information of your Interest and asking you to Login to Your Account.
v Any Email carrying a Link to Click and asking you to Login.


Prevention against Phishing
v Read all the Email Carefully and Check if the Sender is Original
v Watch the Link Carefully before Clicking
v Always check the URL in the Browser before Signing IN to your Account
v Always Login to Your Accounts after opening the Trusted Websites, not by Clicking in any other Website or Email.
Email Tracing
v Tracing an Email means locating the Original Sender and Getting to know the IP address of the network from
which the Email was actually generated.
v To get the information about the sender of the Email we first must know the structure of the Email.
v As we all know the travelling of the Email. Each message has exactly one header, which is structured into fields.
Each field has a name and a value. Header of the Email contains all the valuable information about the path and
the original sender of the Email.
v For tracing an email Address You need to go to your email account and log into the email which you want to trace after that you have to find the header file of the email which is received by you.
ü You will get Source code of the email.
v For Rediffmail-


v For Yahoo mail-




For Gmail-



Now see from bottom to top and the first IP address you find is the IP address of the sender.
Once you have the IP Address of the sender, go to the URL www.ip2location.com and Find the location of the IP Address. 


And you are done we have traced the person.....
And from where he had sent the email.