Search Members Help

» Welcome Guest
[ Log In :: Register ]

 

[ Track This Topic :: Email This Topic :: Print this topic ]

reply to topic new topic new poll
Topic: Email hack and Norton Question< Next Oldest | Next Newest >
 Post Number: 1
Dark Knight Bob Search for posts by this member.
qunt
Avatar



Group: Members
Posts: 2180
Joined: Sep. 2001
PostIcon Posted on: Nov. 28 2001,08:54  Skip to the next post in this topic. Ignore posts   QUOTE

Two unrelated questions i just cant be assed to post 2 seperate posts. first off is it possible to spoof an email address (send someone an email say moomo@moo.com to look in everyway as if it came FROM moomoo@moo.com) this is cos i'm not sure if a mate of mine is in someway fucking with my head or has actually broken into my email address.

second question is, what weakness's in norton firewall are exploitable, i heard it does a lot of automatic rule creation so can i take advantage of this? totally innocent question honest

------------------
Woman has choked. Buy new woman.

Offline
Top of Page Profile Contact Info 
 Post Number: 2
incubus Search for posts by this member.
mack daddy
Avatar



Group: Admins
Posts: 1316
Joined: May 2000
PostIcon Posted on: Nov. 28 2001,09:00 Skip to the previous post in this topic. Skip to the next post in this topic. Ignore posts   QUOTE

>Two unrelated questions i just cant be
>assed to post 2 seperate posts. first off
>is it possible to spoof an email address
>(send someone an email say moomo@moo.com to
>look in everyway as if it came FROM
>moomoo@moo.com) this is cos i'm not sure if
>a mate of mine is in someway fucking with my
>head or has actually broken into my email
>address.

It's not a case of breaking into your email, all you have to do is set the from field to an arbitary value. Piss easy. Check the headers to see where the mail really came from...

>second question is, what weakness's in
>norton firewall are exploitable, i heard it
>does a lot of automatic rule creation so
>can i take advantage of this? totally
>innocent question honest

Software based firewalls are a bit ropey. I'd get a 486 and bung something like SmoothWall on it. It's a doddle

HTH

------------------
"just pressin y0 butt0ns f00" -- miNus

Offline
Top of Page Profile Contact Info WEB 
 Post Number: 3
SLATE Search for posts by this member.
Kiloposter
Avatar



Group: Members
Posts: 1220
Joined: May 2000
PostIcon Posted on: Nov. 28 2001,13:17 Skip to the previous post in this topic. Skip to the next post in this topic. Ignore posts   QUOTE

like previously stated, its probably just forging your name in the from field.. BUT, if the headers are forged, your friend is mighty good with computers. your basic aol hax0r can't do that. Its not a simple task, although its not difficult for any accomplished computer user/hacker/admin, whatever
Offline
Top of Page Profile Contact Info WEB 
 Post Number: 4
damien_s_lucifer Search for posts by this member.
Emperor of Detnet
Avatar



Group: Members
Posts: 33
Joined: Jan. 1970
PostIcon Posted on: Nov. 28 2001,19:25 Skip to the previous post in this topic. Skip to the next post in this topic. Ignore posts   QUOTE

You might want to start by reading thru RFC 821, Simple Mail Transfer Protocol.
Offline
Top of Page Profile Contact Info WEB 
 Post Number: 5
Beldurin Search for posts by this member.
Mayor of Detnet
Avatar



Group: Members
Posts: 1242
Joined: Aug. 2001
PostIcon Posted on: Nov. 28 2001,23:29 Skip to the previous post in this topic. Skip to the next post in this topic. Ignore posts   QUOTE

quote:
Originally posted by incubus:
Software based firewalls are a bit ropey. I'd get a 486 and bung something like SmoothWall on it. It's a doddle

HTH


ropey? bung? doddle?

------------------
For birth control, I like to rely on my personality...

Offline
Top of Page Profile Contact Info WEB 
 Post Number: 6
Dark Knight Bob Search for posts by this member.
qunt
Avatar



Group: Members
Posts: 2180
Joined: Sep. 2001
PostIcon Posted on: Nov. 29 2001,13:00 Skip to the previous post in this topic. Skip to the next post in this topic. Ignore posts   QUOTE

incubus let me put this another way so you might understand better... i don't use norton if you know what i mean.

the part "can i take advantage of this" should have really given the clue

------------------
Woman has choked. Buy new woman.

This message has been edited by Dark Knight Bob on November 30, 2001 at 08:01 AM

Offline
Top of Page Profile Contact Info 
 Post Number: 7
semper Search for posts by this member.
FNG
Avatar



Group: Members
Posts: 16
Joined: Oct. 2001
PostIcon Posted on: Nov. 30 2001,19:25 Skip to the previous post in this topic.  Ignore posts   QUOTE

telnet to smtp server:
helo www.addresshere.com
rcpt-to: recipient@mansexkeychainlovers.net
mail-from: fakeaddress@leethaxors.org
data
Subject: Your ass is attractive
A B C D E F G
.
quit

That's it. You must include that . at the end of data, it signals the end.

Offline
Top of Page Profile Contact Info 
6 replies since Nov. 28 2001,08:54 < Next Oldest | Next Newest >

[ Track This Topic :: Email This Topic :: Print this topic ]


 
reply to topic new topic new poll

» Quick Reply Email hack and Norton Question
iB Code Buttons
You are posting as:

Do you wish to enable your signature for this post?
Do you wish to enable emoticons for this post?
Track this topic
View All Emoticons
View iB Code