Showing posts with label email spoofing. Show all posts
Showing posts with label email spoofing. Show all posts

Tuesday, September 16, 2014

Email Spoofing

Today in this tutorial I will cover about the Email Spoofing. This is new for most of you and other cyber geeks are the master of this. So let's start from basic.

The very first question which comes in your mind is:
What is Email Spoofing?
In simple words Email spoofing is the sending of email with a fake sender address.

They are done in order to fool the user and get their private information, most phishing mails are sent by this method.

Although their are various methods used by the Email sending vendor like SPF (Sender Policy Framework), Sender ID, DKIM (Domain Keys Identified Mail), DMARC (Domain-based Message Authentication, Reporting and Conformance) but even though there are many domain which can be spoofed easily.
Gmail has very powerful spam detection system which has started identifying the spoofed emails and send them to the spam folder. Yet there are large number of domains which are still prone to this.

To send spoofed email, you just need to follow these simple steps, or better say simple sites.
Step 1: Visit any of the sites,
          (i) Emkei.cz
          (ii) Deadfake
          (iii) Anonymizer
          (iv) Anonymailer
Apart from these there are many other websites, all you have to do is Google them out.

Technical Aspects:

When an SMTP email is sent, the initial connection provides two pieces of address information:

MAIL FROM: - generally presented to the recipient as the Return-path: header but not normally visible to the end user, and by default no checks are done that the sending system is authorized to send on behalf of that address.
RCPT TO: - specifies which email address the email is delivered to, is not normally visible to the end user but may be present in the headers as part of the "Received:" header.
Together these are sometimes referred to as the "envelope" addressing, by analogy with a traditional paper envelope.

Once the receiving mail server signals that it accepted these two items, the sending system sends the "DATA" command, and typically sends several header items, including:

From: Joe Q Doe <joeqdoe@example.com> - the address visible to the recipient; but again, by default no checks are done that the sending system is authorized to send on behalf of that address.
Reply-to: Jane Roe <Jane.Roe@example.mil> - similarly not checked


The result is that the email recipient sees the email as having come from the address in the From: header; they may sometimes be able to find the MAIL FROM address; and if they reply to the email it will go to either the address presented in the MAIL FROM: or Reply-to: header - but none of these addresses are typically reliable, so automated bounce messages may generate backscatter.

Author: Unpredictable & Wikipedia

If you have any query then write to us @ prashantsavior@gmail.com and don't forget to like our Facebook page.