Forum: Geek Forum Topic: Email hack and Norton Question started by: Dark Knight Bob Posted by Dark Knight Bob on Nov. 28 2001,08:54
Two unrelated questions i just cant be assed to post 2 seperate posts. first off is it possible to spoof an email address (send someone an email say moomo@moo.com to look in everyway as if it came FROM moomoo@moo.com) this is cos i'm not sure if a mate of mine is in someway fucking with my head or has actually broken into my email address.second question is, what weakness's in norton firewall are exploitable, i heard it does a lot of automatic rule creation so can i take advantage of this? totally innocent question honest ------------------ Posted by incubus on Nov. 28 2001,09:00
>Two unrelated questions i just cant be >assed to post 2 seperate posts. first off >is it possible to spoof an email address >(send someone an email say moomo@moo.com to >look in everyway as if it came FROM >moomoo@moo.com) this is cos i'm not sure if >a mate of mine is in someway fucking with my >head or has actually broken into my email >address. It's not a case of breaking into your email, all you have to do is set the from field to an arbitary value. Piss easy. Check the headers to see where the mail really came from... >second question is, what weakness's in Software based firewalls are a bit ropey. I'd get a 486 and bung something like < SmoothWall > on it. It's a doddle HTH ------------------ Posted by SLATE on Nov. 28 2001,13:17
like previously stated, its probably just forging your name in the from field.. BUT, if the headers are forged, your friend is mighty good with computers. your basic aol hax0r can't do that. Its not a simple task, although its not difficult for any accomplished computer user/hacker/admin, whatever
Posted by damien_s_lucifer on Nov. 28 2001,19:25
You might want to start by reading thru < RFC 821, Simple Mail Transfer Protocol >.
Posted by Beldurin on Nov. 28 2001,23:29
quote: ropey? bung? doddle? ------------------ Posted by Dark Knight Bob on Nov. 29 2001,13:00
incubus let me put this another way so you might understand better... i don't use norton if you know what i mean.the part "can i take advantage of this" should have really given the clue ------------------ This message has been edited by Dark Knight Bob on November 30, 2001 at 08:01 AM Posted by semper on Nov. 30 2001,19:25
telnet to smtp server:helo < www.addresshere.com > rcpt-to: recipient@mansexkeychainlovers.net mail-from: fakeaddress@leethaxors.org data Subject: Your ass is attractive A B C D E F G . quit That's it. You must include that . at the end of data, it signals the end. |