Open top menu
Friday, 24 January 2014

How Email Works?

+ Email sending and receiving is controlled by the Email servers. All Email service providers configure Email Server before anyone can Sign into his or her account and start communicating digitally.
+ Once the servers are ready to go, users from across the world register in to these Email servers and setup an Email account. When they have a fully working Email account, they sign into their accounts and start connecting to other users using the Email services.


Email Spoofing

+ Email spoofing is the forgery of an Email header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately.
+ There are so many ways to send the Fake Emails even without knowing the password of the Email ID. The Internet
is so vulnerable that you can use anybody's Email ID to send a threatening Email to any official personnel.

Methods to send fake Emails

Open Relay Server
Web Scripts

Fake Emails: Open Relay Server

+An Open Mail Relay is an SMTP (Simple Mail Transfer Protocol) server configured in such a way that it allows anyone on the Internet to send Email through it, not just mail destined ‘To’ or ‘Originating’ from known users.
+An Attacker can connect the Open Relay Server via Telnet and instruct the server to send the Email.
+Open Relay Email Server requires no password to send the Email.

Fake Emails: via web script

+Web Programming languages such as PHP and ASP contain the mail sending functions which can be used to send Emails by programming Fake headers i.e.” From: To: Subject:”
+There are so many websites available on the Internet which already contains these mail sending scripts. Most of them provide the free service.
+Some of Free Anonymous Email Websites are:

+Mail.Anonymizer.name (Send attachments as well)
+FakEmailer.net
+FakEmailer.info
+Deadfake.com

Proving a fake Email
+Every Email carry Header which has information about the Travelling Path of the Email
+Check the Header and Get the location from the Email was sent
+Check if the Email was sent from any other Email Server or Website
+Headers carry the name of the Website on which the mail sending script was used.

Securing your Email account
+Always configure a Secondary Email Address for the recovery purpose.
+Properly configure the Security Question and Answer in the Email Account.
+Do not Open Emails from strangers.
+Do not Use any other’s computer to check your Email.
+Take Care of the Phishing Links.
+Do not reveal your Passwords to your Friends or Mates.

Hope this tutorial is useful to you. This is only for educational purpose. Feel free to comment…

Tagged
Different Themes
Written by Lovely

Aenean quis feugiat elit. Quisque ultricies sollicitudin ante ut venenatis. Nulla dapibus placerat faucibus. Aenean quis leo non neque ultrices scelerisque. Nullam nec vulputate velit. Etiam fermentum turpis at magna tristique interdum.

0 comments