Ethical Hacking Free Course: Episode 06 ; Email spoofing details!
Ethical Hacking Free Course: Episode 06 ; Email spoofing details!
Ethical Hacking Free Course Part 06 Welcome to. Today I will discuss with you about email spoofing, its name may be heard by many and many may not have heard. However, if you have heard about email spoofing, it is good, and if you have not heard, it does not matter, I will explain in detail about all the issues today. I have already said that no one will take email spoofing in an easy way. Maybe it's a very simple method but it's the scariest thing on the internet. Now 75% of all credit card and PayPal accounts hacked in the world are done by spoofing this email alone. Then you understand how important it is to know to keep your online account safe. So let's start today's discussion without further ado.
What is email spoofing?
Spoofed mail but not just the mail address is spoofed, where the mail came from, the name of the mailer, the mail address, when replying, the mail usually goes to another mail address. Moreover, while spoofing mail, the IP address of the server is also duplicated. In fact, if an expert spoofs the mail, it becomes very costly to understand, unless you call the real person and ask if he has sent the mail.
Who is spoofing emails and why?
But not just for phishing or card hacking but for mail spoofing, hackers' plans can be worse and more destructive. In particular, hackers can also send fake mails to spread rotware on your system, sending fake mails here is more likely to be successful, because you may trust the mail address and download the virus file unknowingly. In addition, there are many mass-mailing worms that can read your address book, meaning that all your contacts will automatically start sending fake mail, hackers can try to attack not only you, but also all your contact mails.
How do hackers find someone's email?
In fact, the website from which I bought the hosting sold my email to another website. So just think, if a hacker bought this email, what could be the result? Now do you understand how a hacker gets your or my email? They actually buy email lists, moreover they use many more methods. Such as collecting your or my email using different newsletters. They also use some bots, which collect their emails automatically. There are many Google bots or Facebook bots, In fact, the bots are for good work, but all these bots are misused. In fact, these bots work on any web page by searching for this. If your email is in the form of text on any web site, then know that you have knowingly handed over the mail to the hacker. So do not publish your mail in the form of comments in the comments section of any website by mistake. If there is a separate mail box in the comments section, where you can enter, because it is protected.
How to spoof mail (Educational)
This is a shell of mine, I am using it on my own server, no worries, although here I am not showing the detailed server setup, but if you communicate privately I can teach you the whole process, Sobuz Bangla TV opens such tutorials for security It is not possible to give, but if you want you can learn how to setup without Google, I gave you the name of the shell, now you know very well what you have to search by typing! However, if you click on PHP TOOLS, a page like the one below will appear.
If you look at this screenshot, you will understand what you have to do. Do you want to see the evidence now? Take a look, a glimpse of my mailbox!

What are you looking at? Hey hey, will you see Aretu gone?
You see, you got 2 crore rupees. This is the subject of my email. Demo email to show on Sobuz Bangla TV ”This is the body of my email. And do you see from which email the email came? From Bangladesh Bank. So you understand how a hacker can easily send you mail from an address exactly like the original mail address. If you do not want to set up a server, there are various online tools where you can send a mail by duplicating the mail address, many services may be free, many may have to buy a service plan, but if you have a web server, it is easy to build such a tool. Possible. Let me know by commenting below, if I get a good response, I will create a PDF and share the mail spoofing setup guide on your free web server.
Recognize fake mail and its remedy



A spam mail is coming to me, you will understand when you see its red boxes. It is easy to understand that this is a spam mail. I hope you can be safe if you take care of all these things. And again, think twice before clicking on the link in the mail, to find out, how to know if it is safe without clicking the malicious link?
Email bombing
There are many deeper interests of hackers in email bombing. Let me tell you in advance, when a hacker or a hacker team tries to do a large type of hacking, every aspect of the victim is monitored. Many times hackers can also bomb mail to bring down someone's business. Suppose you have a special deal with a particular company and a mail may come in, and you must reply to that mail if you want to finalize the deal. Now suppose a hacker or your opponent is keeping a close eye on all your matters, in which case you will be sent 1 lakh mails just before the mail arrives. This will cause your inbox to be full, you will not receive new mail, or new mail will actually be lost in a huge black hole of mail.
Now the question is how to stop this mail bombing? Select the mail that is coming to you and put it in the spam box. The bus is over, this time the hacker guy is eating mudri. How do you do mail bombing, well, google it, you will get many tutorials for free! Not discussed here, because the issue is not so important. And no matter how much I say "no one will do bad things" - the bat will use 80% of bad things.
Finally, I would like to say that you can use your present intellect to survive many big attacks, that is online / offline. Email spoofing is a very dangerous method to hack any online ID. We hope you enjoy our Ethical Hacking Free Course. Sabuj Bangla TV wants your own protection so that you can give it yourself, and that is our small effort. As an ethical hacker, you need to create awareness, you need to explain things to yourself or your client. You may also have to use different techniques to do a lot of great work together. To become a full-fledged ethical hacker or security specialist, you also need to make yourself the father of a black hat. So many thanks so far today for reading this post to the end.












No comments