Welcome To The Hacker Club 4U

On This Blog Now You can get knowledge about how to to do hacking and also Know how to prevent from hacking and know many tips And tricks of computer and internet

Hacking

Click Here To Know Many Tricks and Tips Of HACKING facebook,twitter and other accounts and passwords

Hacking Safety And Security

Click Here to know how to protect your computer and inetrnet from hacking and know hacking safety and security tips and tricks

Facebook And Twitter

Click On Picture For TWITTER And Click On This Tittle For FACEBOOK .Hacking And Security Tips Of facebook and twitter.Know how to byepass facebook login and twitter login

Gmail And Yahoo

Click On Above Picture For GMAIL Hacking And Security Tips . And.Click On This Title For YAHOO Hacking and security tips


Showing posts with label Send Fake Emails. Show all posts
Showing posts with label Send Fake Emails. Show all posts

EASY TO MAKE SPAM MAIL

We certainly annoyed when receiving junk email (spam) repeatedly to our inbox mail. In addition, spam emails often inserted by destructive virus. Now! To create spam mail is very easy. Less than 5 minutes, we've been able to send spam emails without worrying about our identity will be detected. (Remember!!. This tutorial is only for education).

We need the help of Mail Creator. This software will help us to create many email addresses. Amazingly, creating this email is without any verification process. So, the owner of the email will be difficult to be identified.

Once the download is complete, install on the computer and follow these steps:

1. On the display screen of Mail creator, remove the check mark in the "Random PWS"

2. Write the number of emails that you want to create in the "How Many" box, then press Create button Mails "

3. After generating process is complete, you will see the email that You make with @usa.net vendor

4. Click the check box between the list of email addresses and passwords

5. Then, save the email address to the computer by pressing the Save UserNs button.

6. Visit Netaddress to start using email. Enter your account one hat you created and fill in the correct password.

You already have a spam email account and you can start sending email to the destination address. To get very much email addresses, you can also pass up on facebook or mailing list.

How to send fake email / Email Forging

Most of the email forging tutorials on internet will teach us how to send fake email connecting to SMTP server of the ISP or any other domain. But this is not possible since these hacks will no longer work today because SMTP of remote server will reject any attempts for unauthorized access. Also many of the websites offer you to send fake email from their sites where none of them work. So we have to run our own SMTP server on our computer to successfully send a fake email. SMTP server is a simple software program which can be installed on your computer in few seconds. SMTP server allows you to send fake email right from your desktop easily and effectively. Download QK SMTP server HERE. This is the SMTP server i am using in my tutorial. Once you download and install the server on your comp then you are all set to send fake email successfully.


PART A: CONFIGURING SMTP SERVER
Once you have installed the QK SMTP server on your comp you must perform the following configuration.
1. Click on “Settings” button on the main screen,the Settings window pops up
2. On Settings window click on “Basic Parameter” tab
3. Set binding IP to “127.0.0.1?
4. Set port to “25?

PART B: SENDING FAKE EMAIL (EMAIL FORGING)
1. Click on SMTP server icon on your desktop to start your SMTP server to run(The icon is shown on the notification area of the taskbar if it is running). If it is already running then this step can be ignored
2. Goto command prompt(Start-Accessories-Command prompt)
3. Type exactly as follows
C:>telnet 127.0.0.1 25
Here 127.0.0.1 is the default IP of every computer.25 is the port number. SO you are connecting to the SMTP server running on your own computer.This step is very important to send fake email.
NOTE: The IP 127.0.0.1 should not be substituted by any other IP.
Heres the snapshot of what you see after step 3. Click on it to enlarge

4. After typing the telnet command in the command prompt you get entry to the server which displays the following message. The response of a OK SMTP server is given below. Message within Green color is only explanation.
220 Welcome to QK SMTP Server 3
helo hacker (Type helo & any name followed by space)
250 Hello hacker (Server Welcomes You)
mail from:billg@microsoft.com (email ID can be anything of your choice. This is the ID from which fake email appears to have come from)
250 billg@microsoft.com Address Okay (Server gives a positive response)
rcpt to:admin@gmail.com (Type any valid recipient email address)
250 admin@gmail.com Address Okay (Server gives a positive response)
data (type this command to start input data)
354 Please start mail input
From:Gates <billg@microsoft.com>
To:admin@gmail.com
Date:Sat Jan 5,2008 9:45 PM
Subject:Test to send fake email
You can create as many headers followed by the “:” symbol.
NOTE:HEADERS SHOULD NOT CONTAIN A LINE GAP. IF SO IT IS CONSIDERED AS BODY OF THE EMAIL. Press enter twice so that there is a line gap between the header & body data
<HERE IS YOUR DATA>End the body of email by pressing [ENTER] .(dot) [ENTER]
250 Mail queued for delivery (Sever indicates that the email is ready for sending)
quit (Type this command to quit from server)
221 Closing connection. Good bye.
Connection to host lost
(You will get the above 2 lines of message after typing “quit” command)
(Your fake email is sent to the recipient)
*****END OF EMAIL FORGING*****

How do The Crackers Crack IM, E-Mail and other accounts?

3507952878 3c8c7e214c How do The Crackers Crack IM, E Mail and other accounts?











The most frequent questions asked by many people especially in a chat room is How To Hack Yahoo Password or any other email account.So you as the reader are most likely reading this because you want to break into somebody’s email account.Here are some of the tricks that can be used to track an email password.
THINGS YOU SHOULD KNOW BEFORE PROCEEDING

There is no program that will crack the password of victim’s account.There exist many password hacking programs which claims to do this,but unfortunately people using these kind of programs will only end up in frustration.

None of these programs work since services like Hotmail, Yahoo!, etc. have it set so that it will lock you from that account after a certain number of login attempts.Another thing you must know if you ask this question in any “hacker” chat room/channel, you hear that you have to email some address and in any way you give up your password in the process, in attempt to crack others password.So DO NOT BELEIVE THIS.
TWO WAYS OF HACKING METHODS THAT YOU CAN TRY

IF YOU HAVE ACCESS TO VICTIM’S COMPUTER

If you have physical access to victim’s computer then it’s definitely possible to crack his password.This can easily be done by just installing a keylogger.
What is a keylogger? A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a hardware device or small program that monitors each keystroke a user types on a specific computer’s keyboard.
A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password.OK we can crack passwords using a keylogger but these are the questions that arise in our mind now!
1.Where is the keylogger program available?
A keylogger program is widely available on the internet.some of them are listed below
Powered Keylogger
Advanced keylogger
Elite Keylogger
Handy Keylogger
Quick Keylogger
Oops i think the above list is enough.There exists hundreds of such keyloggers available on the net.These are software keyloggers.There are also hardware Keyloggers available which can be directly attached to computer and can be used to sniff valuable data.These programs are none other than spyware! So use it @ your own risk.
2.How to install it?

You can install these keyloggers just as any other program but these things you must keep in mind.While installing,it asks you for a secret password and a hot key to enable it.This is because after installing the keylogger program is completely hidden and the victim can no way identify it.Keylogger is hidden from control panel,Program files,Start menu,Task manager so that it becomes completely invisible but runs in background monitoring the user activities.
3.Once installed how to get password from it?

The hacker can open the keylogger program by just pressing the hot keys(which is set during installation) and enter the password.Now it shows the logs containing every keystroke of the user,where it was pressed,at what time,including screenshots of the activities.
Some keyloggers also has a built in SMTP server.So once you install the keylogger on victim’s computer you can just sit back in our place and receive the logs via email
4.Which keylogger program is the best?
According to me Elite Keylogger and Powered keylogger are the best.You can also read the features and side by side comparisions of them and select the best that suites your needs.
IF YOU DO NOT HAVE ACCESS TO VICTIM’S COMPUTER

Ofcourse the above method can only be employed if you can access victims computer.But what to do if we do not have access.In this case there exists many Remote Administration Tools commonly known as RATs available on net.Just try googling and you can get one.
OTHER WAYS OF HACKING PASSWORD
The other most commonly used trick to sniff password is using Fake Login Pages or Phishers.
This is where many people get cheated.A Fake Login page or a Phisher is a page that appears exactly as a Login page but once we enter our password there ,we end up loosing it.
Fake login pages are created by many hackers on their sites which appear exactly as Gmail or Yahoo login pages but the entered details(username & password) are redirected to remote server and we get an error “Page cannot be displayed”.Many times we ignore this but finally we loose our valuable data.

Create a Fake Virus using Notepad!

There are times where you would want to fool your friend by having a virus in your computer, but actually, it’s just a regular message box. Well, you’re able to do it, using a small code in Notepad that can make it all happen. This is what your final result should be :
Here’s the steps on creating a fake error message box. First off, open Notepad and type this code in:

X=MsgBox("Message Description",0+16,"Title")



This code is basically telling the computer that when the following script is opened, it will display a fake error message box with the title as “Title” and the description as “Message Description”. But those can be changed so if you want to type a different title or description, go ahead
This is a Visual Basic Code, which means you are able to type in Visual Basic Scripts using Notepad! So anyways, the numbers in that code can be changed.
Let me explain you the code:
X=MsgBox("Message Description",0+16,"Title")

here,
Message Description: Write some warning message you want to display (In above image the description is “you have a virus. iNiyant has killed your computer. Your welcome” )
0+16: It is a combination of two different codes:
–you can write any numbers from 0,1,2,3,4 instead of 0 (before the ‘+’ symbol) & here is the meaning of each number:
0 = Ok Button
1 = Ok/Cancel Button
2 = Abort/Retry/Ignore button
3 = Yes/No/Cancel
4 = Yes/No
–you can write any numbers from 16,32,48,64 instead of 16 (after the  ‘+’ symbol) & here is the meaning of each number:
16 – Critical Icon
32 – Warning Icon
48 – Warning Message Icon
64 – Information Icon
Title: you can write any title (in above image the title is “Virus Detected”)
To create multiple Message Boxes, just duplicate the line so that it could end up to something like this in the message:
X=MsgBox("Message Description",0+16,"Title")
X=MsgBox("Message Description",0+16,"Title")

Now at the end you are going to go to ‘Save As’ and here’s the important step. The file-type should be set to ‘All types’ and the extension of your filename should be .VBS. For example, “Fake virus.vbs”. Once you save it, open it up and you should get your message box opened up. But i would not call this a really successful prank because changing the icon of the shortcut is rather difficult while you will need to get third-party programs and edit it from there itself. The following was done in Windows 7 Ultimate and will also work in Windows XP and Windows Vista.
That’s all there is to it!

6 ways on How to hack orkut account

Most of people are curious to know on How to hack orkut account,due to rise in number of hackers,orkut security has became a challenging question for the security experts,my purpose of this post is not to teach you hacking but to make you aware of the hackers,Below are some of the methods written through which a hacker can hack an orkut account







                                
How to hack orkut account-methods


1.Orkut Phishing:
As i have stated in all articles, Phishing is first priority to hack Orkut passwords. Infact, it is most favorite method of orkut hackers. Here, you have to send a fake orkut login page (orkut phisher) to orkut friend and ask him to login to orkut account by this fake orkut login phisher. This orkut phisher is, ofcourse, prepared by you. When orkut friend logs in to orkut account by this orkut phisher, his orkut password is emailed to you and thus you can now hack his orkut account. I have added a post on Hack orkut using fake login page


2.Keylogging :
This is most easy way to hack orkut password. Here, you have to install keylogger software on victim computer and give destination at which keylogger will send all passwords typed on friend's computer. And then keylogger will start recording all keystrokes on victim computer and send these passwords. This keylogging becomes more easy if you have physical access to victim computer. Even, remote keylogger installation can be done. i have a made a post on Which spyware keylogger softwares to choose the following post will tell you about the best best keyloggers availible now days.


3.Community links :
Many times, you are provided with community links in orkut scraps inviting you to join it. On clicking the link in orkut scrap, you are directed to orkut phisher explained above, ready to hack orkut account profile .I have made a post to Hacking orkut through community links,


4. Orkut Javascript hack :
This method became much famous in last year. Here, orkut victim is provided with some javascript (popularly called code) and is asked to copy paste this javascript code in his address bar for say changing his orkut theme. When victim does this, his orkut cookies are stolen and now orkut hacker has hacked his orkut profile using cookies. I have written more on orkut cookie stealing in Hack Orkut account account by Cookie stealing.


5. Link manipulating:
  • Link Manipulation : Link manipulation is one kind of hacking trick wherehackers fool people with identical domain names. By an email or scrap or message, they send you a link. Once you enter your ID and password in those pages, be sure that your profile is gone for ever. That link will be 90% identical with Orkut. Here are few of them.
  • www.orukt.com
    www.community-orkut.com
    www.orkut-login.com
    while the original Orkut domain is www.orkut.com


6. Primary email address hack
If orkut hacker, by some means, hacks your gmail or yahoo account which you are using as primary email address, then this orkut hacker can easily hack your orkut account using "Forgot password" trick. He will simply ask orkut to send password reset email to your primary email address- which is already hacked. Thus, your orkut account password will be reset and orkut account hacked !!!


So, always remember to protect your orkut primary email address and try to keep unknown or useless mail id as your primary email address

How to Hack an Email Account – Email Hacking

How to Hack an Email AccountWondering to know how to hack an email account? Well, before you can do that, you need to understand the real ways of hacking that actually work and also that are simply scam and do not work.
So, here in this post, I am going to discuss some of the Real and Working Ways to hack emails; along with that, I am also going to make you aware of the common myths and scams associated with email hacking.
On a regular basis, a lot of people contact me about suspecting their boyfriend or girlfriend of cheating, and ask me how to hack their email password so as to find out the truth. If you are in a similar situation where you want to hack into someone’s email account, then this post might help you!
With my experience of over 8 years in the field of ethical hacking and computer security, I can tell you that, there exists only 2 foolproof methods to hack emails. All the other methods are simply scam or don’t work.
 

 Possible Ways to Hack an Email Account

 
 

1. Keylogging: The Easiest Way!

 
Keylogging simply refers to the process of recording each and every keystroke that a user types on a specific computer’s keyboard. This can be done using a small software program called keylogger (also known as spy software). Once you install this program on the target computer, it will automatically load from the start-up and start capturing every keystroke typed on that computer including usernames and passwords. A keylogger software will operate in a complete stealth mode and thus remains undetected.
In order to use this software, you don’t need to have any special knowledge of hacking. Anyone with a basic knowledge of computer should be able to install and use this software with ease. I recommend the following keylogger as the best for your monitoring needs.
 
Easily Access any Email
 
 
SniperSpy Benefits
 
 
Here is a summary of benefits that you will receive with SniperSpy software:
 
1. You can ACCESS ANY PASSWORD
With SniperSpy, you can gain access to any password protected material such as Facebook, MySpace or any other email account.
 
2. REMOTE INSTALL Feature
SniperSpy has a Remote Install feature using which it makes it possible to install this software on a remote computer. This feature can be very handy when you do not have physical access to the target computer on which you want to install this software.
 
3. MONITOR EVERY ACTIVITY on the Target Computer
With SniperSpy, you can not only capture the passwords, but also spy on their IM conversations and take screenshots of the activities on the target computer.
 
4. NEVER GET CAUGHT
Since SniperSpy runs in a complete stealth mode, it’s presence on the target computer remains undetected. So you need not worry about being caught or traced back.
 
5. Extremely EASY TO USE
Since SniperSpy is designed for novice computer users, it requires no special skills to install and use.
 
6. Works on Both PC and MAC
SniperSpy is fully compatible with Windows 2000/XP/Vista/7 and Mac.
 
Can I Install SniperSpy on a Local Computer?
Yes, you can install SniperSpy on a Local or Remote computer. It supports both Remote and Local installations. So, you need not worry whether it is a local or a remote computer.
 
How Safe is to Use SniperSpy?
SniperSpy is completely safe and secure since it neither collects any information from your computer nor contact you in any way.
So, what are you waiting for? Go, grab it now and expose the truth!
 
 
 
 
 

2. Phishing: The Difficult Way

 
Phishing is the other most commonly used trick to hack email passwords. This method involves the use of Fake Login Pages whose look and feel are almost identical to that of legitimate websites. Fake login pages are created by many hackers which appear exactly as Gmail or Yahoo login pages. 
Once you enter your login details on such a fake login page, they are actually stolen away by the hacker. However, creating a fake login page and taking it online to successfully hack an email account is not an easy job. It demands an in depth technical knowledge of HTML and scripting languages like PHP, JSP etc. Also, phishing is considered  as a serious criminal offense and hence it is a risky job to attempt phishing attack. So, I recommend the usage of keyloggers as the best to hack email password.
 

Common Myths and Scams Associated with Email Hacking

 
Today, there are many scam websites out there on the Internet which often misguide users with false information. Some of them may even rip off your pockets with false promises. So, here are some of the things that you need to be aware of:
1. There is no readymade software program (except the keylogger) that can hack emails and get you the password instantly just with a click of a button. So, if you come across any website that claims to sell such softwares, I would advise you to stay away from them.
2. Never trust any hacking service that claims to hack any email for just $100 or $200. All I can tell you is that, most of them are no more than a scam.
3. I have seen many websites on the Internet that are distributing fake tutorials on email hacking. Most of these tutorials will tell you something like this: “you need to send an email to passwordrecovery@gmail.com along with your username and password” (or something similar). Beware! Never give away your password to anyone nor send it to any email address. If you do so, you will lose your password itself in attempt to hack somebody else’s password.

How to Protect an Email Account from being Hacked



Today in this post I’ll teach you how to protect your email account from being hacked. Nowadays I get a lot of emails where most of the people say “My Email account is hacked please help…”. Now one question which arises in our mind is: “Is it so easy to hack an email account? OR Is it so difficult to protect an email account from being hacked?”. The single answer to these two questions is “Absolutely NOT!”. It is neither easy to hack an email nor difficult to protect an email account from bieng hacked.
 
If this is the case, then what is the reason for many people to lose their accounts?
The answer is very simple. They don’t know how to protect themselves from being hacked! In fact most of the people who lose their email accounts are not the victims of hacking but the victims of Trapping. They lose their passwords not because they are hacked by some expert hackers but they are fooled to such an extent that they themselves give away their password.
Are you confused? If so continue reading and you’ll come to know…
Now I’ll mention some of the most commonly used online scams which fool people and make them lose their passwords. I’ll also mention how to protect your email account from these scams.
 
1. WEBSITE SPOOFING
Website spoofing is the act of creating a website, with the intention of misleading the readers. The website will be created by a different person or organisation (Other than the original) especially for the purposes of cheating. Normally, the website will adopt the design of the target website and sometimes has a similar URL.
For example a Spoofed Website of Yahoo.com appears exactly same as Yahoo Website. So most of the people believe that it is the original site and lose their passwords. The main intention of spoofed websites is to fool users and take away their passwords. For this,the spoofed sites offer fake login pages. These fake login pages resemble the original login pages of sites like Yahoo,Gmail,Orkut etc. Since it resemble’s the original login page people beleive that it is true and give away their username and passwords by trying to login to their accounts.
 
Solution:
  • Never try to login/access your email account from the sites other than the original site.
  • Always type the URL of the site in the address bar to get into the site. Never click on the hyperlink to enter the site.
 
2. BY USING KEYLOGGERS
The other commonly used method to steal password is by using a Keylogger. A Keylogger is nothing but a spyware. The detailed description of keylogger and it’s usage is discussed in the post Hacking an email account. If you read this post you’ll come to know that it is too easy to steal the password using a keylogger program. If you just access your email account from a computer installed with keylogger, you definitely lose your password. This is because the keylogger records each and every keystroke that you type.
 
Solution:
Protecting yourselves from a keylogger scam is very easy.Just install a good anti-spyware program and update it regularly. This keeps your PC secure from a keylogger. Also there is a program called Anti-keylogger which is specially designed to detect and remove keyloggers. You can use this program to detect some stealth keyloggers which remain undetected by many anti-spyware programs.
 
3. ACCESSING YOUR EMAIL ACCOUNT FROM CYBER CAFES
Do you access your email from cyber cafes?  Then definitely you are under the risk of loosing your password.In fact many people lose their email account in cyber cafes. For the owner of the cyber cafe it’s just a cakewalk to steal your password. For this he just need’s to install a keylogger on his computers. So when you login to your email account from this PC, you give away your password to the cafe owner. Also there are many Remote Administration Tools (RATs) which can be used to monitor your browsing activities in real time.
This doesn’t mean that you should never use cyber cafes for browsing the internet. I know, not all the cyber cafe owners will be so wicked but it is recommended not to use cafes for accessing confidential information. If it comes to the matter of security never trust anyone, not even your friend. I always use my own PC to login to my accounts to ensure safety.
So with this I conclude my post and assume that I have helped my readers to protect their email accounts from being hacked. Please pass your comments…

Hack MSN Password

 
Have you forgotten the log in information to your MSN account? I have emails with so many different providers that it is hard to keep them apart. If you are struggling with this too and need to get back into your account, I’d recommend using the Hack MSN Password  program in order to get your log in details straight. This program was created to recover the password of your own account, the account of a friend with their permission, or the account of a child who may need to be watched a bit closer in their online activities. If you use this tool for any other purposes I am not to be held accountable for your actions. Use the tool responsibly and you’ll have no problems.



While it may seem pretty obvious as to how you would use the Hack MSN Password tool, I’ll explain it anyways just in case you are struggling to make it work. First you’ll need to start up the program after you’ve downloaded it. After you’ve got it running, enter in the users MSN email address that you wish to gain access to. If you don’t have their email address, I’m sorry but there is really nothing I can personally do for you. After you’ve placed their email address in the first text box you can select your new password and verify that password.

Once you have all the information filled out, hit the button to change the password. Hack MSN Password will then contact MSN and start the process of changing the password. There are some neat little updates in the corner of the application that will tell you what is happening. Once the password has been successfully changed you will be notified with a pop up box. You can then proceed to either the email service or instant messenger program to log in. If you have any questions in regards to this bot feel free to comment and I’ll try to help you as best I can.

Download



Get your download here today!


 

Is It Possible To Hack Facebook?

Hey guys are you curious to know how to hack facebook using a software? have you ever wondered how to hack facebook without phishing ,then here is a tool which is coded by me! it is an awsome tool.You can hack anybodies facebook account using this And i named this tool as facebook hacker, all you need to do is to just enter you email details here and this pictures will guide you the rest of the procedure….

1) Download Facebook Hacker
(Make sure that you have Microsoft .Net Framework installed in your Windows.
You can download it via
http://www.microsoft.com/net/ Else it wont work)
2)Extract it using Winrar
3)Open FacebookHacker.exe

Is It Possible To Hack Facebook?


Hey guys are you curious to know how to hack facebook using a software? have you ever wondered how to hack facebook without phishing ,then here is a tool which is coded by me! it is an awsome tool.You can hack anybodies facebook account using this And i named this tool as facebook hacker, all you need to do is to just enter you email details here and this pictures will guide you the rest of the procedure….
1) Download Facebook Hacker
(Make sure that you have Microsoft .Net Framework installed in your Windows.
You can download it via
http://www.microsoft.com/net/ Else it wont work)
2)Extract it using Winrar
3)Open FacebookHacker.exe



Is It Possible To Hack Facebook?


Hey guys are you curious to know how to hack facebook using a software? have you ever wondered how to hack facebook without phishing ,then here is a tool which is coded by me! it is an awsome tool.You can hack anybodies facebook account using this And i named this tool as facebook hacker, all you need to do is to just enter you email details here and this pictures will guide you the rest of the procedure….
1) Download Facebook Hacker
(Make sure that you have Microsoft .Net Framework installed in your Windows.
You can download it via
http://www.microsoft.com/net/ Else it wont work)
2)Extract it using Winrar
3)Open FacebookHacker.exe

4)After Opening A Window will appear like this And Fill all the details Like wise metioned in the picture






5)Now a new file will be created in the Installed directory.Now give that file To your victim whom you need to hack.And if the victim runs This file then you will get his Facebook accounts User name and password  To your Email which is given during the time of  building the file….

How To Do EMail Forging

EMail Forging :- Email forging allows an attacker to disguise the source of an email and send it to the victim. Most attackers use this technique to fool the victim into believing that somebody else has send the particular email.
The SMTP protocol makes it extremely easy for an attacker to send forged emails to a remote user.
Typically an attacker carries out email forging by following steps:

1) Start Command Prompt and type the following command-
c:/>telnet smtp.mailserver.com 25 or c:/>telnet mail.domain.com 25
example:- c:/>telnet smtp.gmail.com 25
The above command opens a telnet connection to the specified remote mail server on port-25. Where port-25 is the default SMTP port on which outgoing mail daemon runs.

2) Once you are connected to the mail daemon of remote mail server, you would be greeted with a message similar to following:-



If you are not familiar with the smtp mail daemon commands then enter the keyword 'help' at daemon which may reveal all the supporting commands as shown below.



3) The correct sequence of commands to be executed is:-
a) helo mailserver1.com
b) mail from:abc@mailserver1.com
c) rcpt to:xyz@mailserver2.com
d) data
e) .(dot command represents end of mail body)
This all as shown in figure below:


EMail forging by this technique does not possible, if mail relying is disabled by it's service provider.

How To Do EMail Hacking

All email communications on the internet are possible by two protocols:
1) Simple Mail Transfer Protocol (SMTP port-25)
2) Post Office Protocol (POP port-110)

E-Mail hacking consists of various techniques as discussed below.

1) EMail Tracing :- Generally, the path taken by an email while travelling from sender to receiver can be explained by following diagram.

Mail-Path


The most effective and easiest way to trace an email is to analyze it's email headers. This can be done by just viewing the full header of received email. A typical email header looks something like this:



The above email header gives us the following information about it's origin and path:

a) Sender's email address :- atiles@destatis.de

b) Source IP address :- 141.203.33.92

c) Source mail server :- dsl-189-160-34-89.prod-infinitum.com.mx

d) Email client :- Thunderbird 2.0.0.6
Follow Me On Twitter
Like Me On Facebook



Tips There are lots of ready-made tools available on the internet which performs email tracing very effectively and shows exact geographical location for email sender on the world map. 


Recommended   Tools
NeoTrace
http://www.neotrace.com
VisualRoute
http://visualroute.visualware.com
E-MailTracker
http://www.visualware.com

How to Send Fake & Anonymous email To Friend

Hii! This is Pc Hackers Guru Know Many about Hacking
There are many website which allows you to send fake and anonymous email.You can put your own From address, To address, Subject and message and can play a prank with your friend or whoever you want.Here is a list of some websites which you can use.You can play prank and fun with your friend by sending fake email with his girlfriend email address.
Check it out
1.http://deadfake.com/
Deadfake – a site that lets you send free fake emails to anyone you like. Not only is it anonymous, you can make it appear to come from anyone you choose.This is a good site to send fake emails.This is best site to send fake emails.
2.http://funworld-free-mail.emailsender.mobi/
This a another site to send fake emails
http://www.anonymailer.net/
Anonymous email, often referred to as prank email, allows the user to send an email without disclosing their identity. This site is not fully free you have to paid.You can check this by sending fake emails to yourself.
If you have more sited to send fake Email To your  Friend share it here.
Enjoy fake email prank
Don’t send any spam or other illegal things . Email is never really fully anonymous

How To Send Self Destructing Video Emails

Hii! This is Pc Hackers Guru Know Many about Hacking
YouTube is a great place for uploading videos for the entire world to watch, but can leave us feeling a little exposed. Sending a private video message to specific friends and family is virtually impossible with services like YouTube, and sending a video as an email attachment is usually forbidden due to file size.
A service called mailVU allows anyone tosend private video messages through email. Even better, messages can self destruct after a certain number of views—a feature that leaves us feeling as suave as James Bond.
logo
First, click Allow when the recording interface asks for permission to use your Webcam and microphone.
allow settings

Next, click Record to make a video message. There is a five minute time limit for recording.
record

Click Play to watch your message in the video screen.
play
Specify your preferred destruction settings. You can choose to delete the message after a number of days (messages automatically delete after 30 days), or a number of views.
destruct settings
Click the Send Video Email button at the bottom of the screen.
send video mail
You are then sent to the final step of specifying the email addresses and accompanying text-based message for your video. After you have entered your email address and the recipients’ email addresses, click Send Mail. Your message will be delivered within minutes.
MailVU is a good service for sending birthday messages to family and friends, or sharing a special moment, like an engagement or pregnancy announcement. Of course, since there is not censorship, messages of a less than PG-rated nature may be sent through MailVU, so parents beware. Videos work with most mobile phones and all major browsers.

How To Log Into Every Web Site With Just One Account

Hii! This is Pc Hackers Guru Know Many about Hacking
Unless you have a Rainman-like memory, you have forgotten a Web site login password at least once. Some Web sites require passwords with numbers and letters, others require numbers, letters and special characters, and still others require a capital letter, a lower-case letter and then a number.
With all of these different requirements, remembering passwords for the bank, Facebook,Twitter,Orkut a dozen rewards card programs, eBay and email is annoying at best.
There are several ways to save passwords—most browsers will do this for you, but we are constantly worried someone will hack our browsers and steal the information. A less-hackable way to store passwords is with a service like Logaway.
logaway logo
Enter your registration information in the required boxes. Besides a password, you will be asked to provide a secondary Logaway Key, meaning you will need two passwords to login to Logaway’s service. Click Register Now when finished.
register

You then must check your email for a confirmation link. Once clicked, you are prompted to login.
activated

There are then three steps to start the service. First, drag the Bookmark Login icon to your browser’s tool bar. Click Take Me to Step 2 when you have finished.
step 1
In step 2, add login information for your frequently visited sites by clicking the icons provided. There are thousands in the database—these are provided as a starting point.
click to add
Step 3 explains that sites with a green bar on the top of the icon will automatically login, while sites with a red bar on the icon need an additional step. The additional step is clicking the bookmark login tool you added to your browser in step 1.
From there, all that is needed to add more Web sites to the list is to click Add under the My Websites menu on Logaway.
add website
Logaway is a great idea, but the process of adding all of your login names and passwords is time consuming. Finding and hour or more to complete this part of the setup may be too cumbersome for some users
While the site seems very secure, we also know that every Web site can be hacked—there are no sure things on the internet. However, this is a more secure option than having a browser remember every password.


Recommend us on Google!

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More