Header Ads

Header ADS

Ethical Hacking Free Course: Episode 06 ; Email spoofing details!

Ethical Hacking Free Course: Episode 06 Email spoofing details!

Ethical Hacking Free Course Part 06  Welcome to. Today I will discuss with you about email spoofing, its name may be heard by many and many may not have heard. However, if you have heard about email spoofing, it is good, and if you have not heard, it does not matter, I will explain in detail about all the issues today. I have already said that no one will take email spoofing in an easy way. Maybe it's a very simple method but it's the scariest thing on the internet. Now 75% of all credit card and PayPal accounts hacked in the world are done by spoofing this email alone. Then you understand how important it is to know to keep your online account safe. So let's start today's discussion without further ado.

What is email spoofing?



If we have to talk about email spoofing, first of all we have to discuss what email spoofing is. Email spoofing is sending fake emails to someone. Don't understand? Well suppose I sent you an email using your father's email. I wrote in that email that you come home tomorrow. But your dad didn't send you any emails about this. It's a lot like sending a fake letter to someone, someone is sending a deliberately wrong letter to your address. Now I understand what email spoofing is! The main reason for calling it spoofing is that you are sent an email from a mail address that looks exactly the same. If the address is different, then it is very easy to recognize fake mail but it is a little difficult to understand the mail coming from the same address, most people easily fall prey to this spoofed mail.

Spoofed mail but not just the mail address is spoofed, where the mail came from, the name of the mailer, the mail address, when replying, the mail usually goes to another mail address. Moreover, while spoofing mail, the IP address of the server is also duplicated. In fact, if an expert spoofs the mail, it becomes very costly to understand, unless you call the real person and ask if he has sent the mail.

Who is spoofing emails and why?



Email spoofing is mainly done by hackers (black hat hackers), but they are called spammers. This is why they are called spammers because the mails they actually send are spam mails. They actually do these things for their own benefit. Now the question may come, what is their interest here again? It is in their interest to lie that they can take some money. Let me explain a little more about this subject. Spammers can hack any of your internet IDs by spoofing this email. But most of all their targets are bank accounts, credit cards, Towards PayPal account and various e-bank accounts. They find out some of the emails and those emails, including what accounts are actually open. They run emails a lot like digital marketers. Moreover, there are many tools to check these that can not be said. Then they send spam mails to those mails, maybe send them to someone using the company's mails. It's basically a matter of experience. And there are many tools online to send all these emails, moreover hackers themselves make email tools using web servers. Although the web server is now in use, it is actually an updated version. Moreover, hackers themselves use web servers to create email tools. Although the web server is now in use, it is actually an updated version. Moreover, hackers themselves use web servers to create email tools. Although the web server is now in use, it is actually an updated version.

But not just for phishing or card hacking but for mail spoofing, hackers' plans can be worse and more destructive. In particular, hackers can also send fake mails to spread rotware on your system, sending fake mails here is more likely to be successful, because you may trust the mail address and download the virus file unknowingly. In addition, there are many mass-mailing worms that can read your address book, meaning that all your contacts will automatically start sending fake mail, hackers can try to attack not only you, but also all your contact mails.

How do hackers find someone's email?



Now the question is how does a hacker find your or my email? Earlier I told you an incident that happened to me, maybe after listening to it you will get the answer to your question. At the end of 2015, I decided to open a website, but I did not have a card, so I could not buy hosting from a company in a foreign country, so I bought from a company named after my country, I am making someone small here. No, in fact, this is what everyone around the world does now. Anyway, 3-4 days after the purchase, I received an email from another big company in Bangladesh, their hosting is running at 10% discount and it is written in short or I have subscribed to their website. But I did not go to their website. What does this mean? Where did they get my email? Just think !! What? Think?

In fact, the website from which I bought the hosting sold my email to another website. So just think, if a hacker bought this email, what could be the result? Now do you understand how a hacker gets your or my email? They actually buy email lists, moreover they use many more methods. Such as collecting your or my email using different newsletters. They also use some bots, which collect their emails automatically. There are many Google bots or Facebook bots, In fact, the bots are for good work, but all these bots are misused. In fact, these bots work on any web page by searching for this. If your email is in the form of text on any web site, then know that you have knowingly handed over the mail to the hacker. So do not publish your mail in the form of comments in the comments section of any website by mistake. If there is a separate mail box in the comments section, where you can enter, because it is protected.

How to spoof mail (Educational)



No one will take it badly, I thought I would not show any practical. But if hacking does not show practicality, then how does it feel. So let's not know how to do email spoofing? You've got a lot of tools for email spoofing, but the most commonly used tool on web servers right now. I also do email spoofing using a web server. For this you need a shell, a PHP file called a shell. You can upload this shell to your own or your hacked server and have fun. You will find a shell on the Internet called WSO, in which you will have the option of spoofing emails. I can't share these shells on Sobuz Bangla TV. If anyone needs it later, you can contact me. Now I'll show you some screenshots of how you do email spoofing.

This is a shell of mine, I am using it on my own server, no worries, although here I am not showing the detailed server setup, but if you communicate privately I can teach you the whole process, Sobuz Bangla TV opens such tutorials for security It is not possible to give, but if you want you can learn how to setup without Google, I gave you the name of the shell, now you know very well what you have to search by typing! However, if you click on PHP TOOLS, a page like the one below will appear.

If you look at this screenshot, you will understand what you have to do. Do you want to see the evidence now? Take a look, a glimpse of my mailbox!

What are you looking at? Hey hey, will you see Aretu gone?

You see, you got 2 crore rupees. This is the subject of my email. Demo email to show on Sobuz Bangla TV ”This is the body of my email. And do you see from which email the email came? From Bangladesh Bank. So you understand how a hacker can easily send you mail from an address exactly like the original mail address. If you do not want to set up a server, there are various online tools where you can send a mail by duplicating the mail address, many services may be free, many may have to buy a service plan, but if you have a web server, it is easy to build such a tool. Possible. Let me know by commenting below, if I get a good response, I will create a PDF and share the mail spoofing setup guide on your free web server.

Recognize fake mail and its remedy

There is actually a solution to all the problems, now we are talking about how to protect ourselves from email spoofing. But I have been saying one thing very well before, be careful. Because there are very few ways to work on the internet other than caution. Even then, there are some things that I will say, don't worry. In fact, hackers often send emails that look like real emails. But remember that your bank or e-bank will never ask you to change your password or resubmit your information. However, if you are asked to pay, then take a good look at the URL of the website you are going to. Take a good look at the spellings. If you see that everything is fine then you can give and if you don't see something that looks wrong then stay away from this email. In addition, the email that is coming to you from where the mail is coming, take a good look at the SMTP server.

 

A spam mail is coming to me, you will understand when you see its red boxes. It is easy to understand that this is a spam mail. I hope you can be safe if you take care of all these things. And again, think twice before clicking on the link in the mail, to find out, how to know if it is safe without clicking the malicious link?

Email bombing


You may think it was not talked about today, brother. I did not write for a long time today, what if I do not give a little more? Have you heard this name? Maybe heard. And if you haven't heard of it, you might understand that it must be something like that. In fact, email bombing is the act of sending multiple emails at once. But don't forget that it sends from one email, it sends from many mails!

There are many deeper interests of hackers in email bombing. Let me tell you in advance, when a hacker or a hacker team tries to do a large type of hacking, every aspect of the victim is monitored. Many times hackers can also bomb mail to bring down someone's business. Suppose you have a special deal with a particular company and a mail may come in, and you must reply to that mail if you want to finalize the deal. Now suppose a hacker or your opponent is keeping a close eye on all your matters, in which case you will be sent 1 lakh mails just before the mail arrives. This will cause your inbox to be full, you will not receive new mail, or new mail will actually be lost in a huge black hole of mail.

Now the question is how to stop this mail bombing? Select the mail that is coming to you and put it in the spam box. The bus is over, this time the hacker guy is eating mudri. How do you do mail bombing, well, google it, you will get many tutorials for free! Not discussed here, because the issue is not so important. And no matter how much I say "no one will do bad things" - the bat will use 80% of bad things.


Finally, I would like to say that you can use your present intellect to survive many big attacks, that is online / offline. Email spoofing is a very dangerous method to hack any online ID. We hope you enjoy our Ethical Hacking Free Course. Sabuj Bangla TV wants your own protection so that you can give it yourself, and that is our small effort. As an ethical hacker, you need to create awareness, you need to explain things to yourself or your client. You may also have to use different techniques to do a lot of great work together. To become a full-fledged ethical hacker or security specialist, you also need to make yourself the father of a black hat. So many thanks so far today for reading this post to the end.

Hope everybody on this site also had a great day.  Stay  well, stay healthy, stay safe with Sobuz  Bangla  TV . Thanks. God bless you.  

Green  Bangla  TV YouTube Channel Link : -

https://www.youtube.com/c/SobuzBanglaTV2019  

No comments

Powered by Blogger.