Jump to content

so how would i go about spamming the shit out of a website....


boogie hands

Recommended Posts

ive been on the internet for about 15 minutes and every minute i get an email form the same company with a different address...basically i cant block it and ive already deleted 250 emails from my box....i have a bit of free time today and was just curious if there is some type of program i can use to shoot a few 1000 emails over to these wonderful people....mabey even something a little more fun if there are any suggestions....

 

let me know...im annoyed

Link to comment
Share on other sites

This forum is supported by the 12ozProphet Shop, so go buy a shirt and help support!
This forum is brought to you by the 12ozProphet Shop.
This forum is brought to you by the 12oz Shop.
Originally posted by boogie hands

ive been on the internet for about 15 minutes and every minute i get an email form the same company with a different address...basically i cant block it and ive already deleted 250 emails from my box....i have a bit of free time today and was just curious if there is some type of program i can use to shoot a few 1000 emails over to these wonderful people....mabey even something a little more fun if there are any suggestions....

 

let me know...im annoyed

first............... wuddup bitches................... go buy some spam and mail it to them.
Link to comment
Share on other sites

Ok Boogie, as you already know we have a lot of stupid fucks running around in here. I can maybe help you.

 

The way in which those spammers email you is from weird email addresses that are either not a person's email, or your reply will get bounced back at you because the address is "nonexistent." The reason this happens is because they have tweaked the headers of the message. Anyway, don't worry about that.

 

Is your email address a hotmail? The best thing to do is to talk to your system administrator (if it's not hotmail, and it's a shell account), and tell him to block the offensive party's domain. If it is hotmail, you can block domains instead of individual addresses..... if you are getting alot of emails from different "users" at the same domain, ie. "relentlessmailers.cz", block that domain instead of trying to blcok every user, that way it will get rid of all of them.....

 

Another thing, pay attention to the places on the web that you give your email address to. If your looking at porn sites, sometimes they can "steal" your email address off of your computer, and you'll be getting spammed before you know it. One more thing.... there are these things called "web bugs." It can be a tiny tiny 2 x 2 pixel gif image on an email or webpage. It's kind of like a spy. So if you get spam in your email box, and then you view it, the web bug activates and can do a number of things, including telling the sending party that the email address that they spammed is active.... just from viewing. The best thing to do is to just delete spam without reading at all, I know how tempting that free cellphone or trip to the virgin islands sounds.... it's a scam to hose your email box.

Link to comment
Share on other sites

I work at an Anti Spam company. I filter that shit all day long.... aargh! I guess your email is not one of our customers though.

 

It used to be that a total geek would be the only one with enough nerdiness to know the spamming techniques, but now the software is for sale, and easy to use, so everybody sends bulk email to everyone. It's increased by like 70% - but since it's work I never pay attention to the statistics....

You can buy a spammer CD with millions of harvested email addresses on them. How they get the email address is they use a program called Spider (or something like it) to do a web search for anything with an @ sign which is usually an email account. Then they put those addresses in the BCC header, and they forge another user in the from header, so you can't consistently block the spam. Then they constantly search around for open relays and use those open relays to send out their spam, and disguise all the headers enough so you don't really know where its coming from. It will be different to contantly spam just ONE user or domain.

 

If you really want to spam these people back, learn 'sendmail' a unix based email program, and figure out how to send what's called a 'denial of service attack'. This is stuff I do not know how to do because I'm just a worker-bee and I don't know unix very well. But I hope that was somewhat helpful, boogie. I try every now and then, what with the photo advice and all...

Link to comment
Share on other sites

Guest uncle-boy
Originally posted by boogie hands

 

wow...arent we feeling sassy today? did daddy forget to hug you before he left for work??? aaaaaaaaaawwwwwwwww...

 

:lol:....sassy.....hahahahahahahaah :lol:

Link to comment
Share on other sites

Roo's got the inside info. I've logged into sendmail on my own server before using telnet. If you know how to do it, yes it does take some learning, you can send a message that says it's from a different address than the one that really sent it. Another thing to do is learn how to look at the headers on an email..... there are many tutorials on the net that can tell you what you're looking at. View the headers as "full headers." Doing so will help you figure out where the email is really coming from.

 

Roo: those spider things that you were talking about.... they're also known as web "robots." They "crawl" websites to find certain types of content. You can block spiders with some simple perl scripts..... One example of how a robot is used: Search engines like yahoo and lycos, etc. use robots to find content, and then use what they find to determine what category or search criteria should be entered to find the appropriate page.

Link to comment
Share on other sites

Guest angry xbox
Originally posted by boogie hands

 

wow...arent we feeling sassy today? did daddy forget to hug you before he left for work??? aaaaaaaaaawwwwwwwww...

 

bwuahahahahahahahahahah

Link to comment
Share on other sites

see rip?? i actually got some information from certain people on this board just like i had hoped....golly, who would have thought....

 

you really need to understand that just because your a complete idiot doesnt mean every one else is on the same boat....instead of trying to be an internet bad ass you may want to focus your time on keeping your mouth closed and making a list of what you want for your 16th birthday....

 

thank you

Link to comment
Share on other sites

thank you to i love roo (once again..your always on the ball) and dirty for a little knowledge....

 

i just found a spam program on astalavista that sounds like it will get the job done while hidding my actual IP address...mabey when i sober up ill get it loaded up and fuck with a few offenders....

 

i swear...spam is so obnoxious

Link to comment
Share on other sites

PING

 

OR...

you can just ping someone. Log on to a bunch of computers and ping the domain all at the same time, and don't stop the process.

 

That's the sort of cheap easy way, but you don't really know if it is working... I guess pinging just floods them to a certain extent.

 

All you do is type ping (domain name or IP address) at the Unix shell prompt, and there you have it. Super easy.

 

Try it and tell me what happened...

 

Oh yeah, if I ever did any of this stuff, I wouldn't just be fired, I'd probably be prosecuted or the pants sued off me.

 

g'night kids!

Link to comment
Share on other sites

Roo: That ping thing that you said up there.... it works alright that way.... but there is a much better way. I don't know if any one here reads 2600 magazine, but they usually have some pretty good technogeek infos on various computer/wireless related stuffs. Well, I'll link to the most recent magazine's TOC, the article "Getting Into Cisco Routers" has a ping command that is more tailored to what Roo is trying to get you to do. Although, you cannot read the article online, the magazine is only $5 at Barnes and Noble. Another really good computer security related link is Security Focus. Check out the "basics" area, they have some easier to grasp ideas in that section.... anyway the link....

 

 

http://www.2600.com/covers/su021.gif'>

Link to comment
Share on other sites

Actually IP spoofing doesn't require a proxy server specifically, just shell access to a server. You're just masking the originating IP information by making requests through a different route. Each path lays on a new layer of IP information. Generally you spoof using Proxy servers or University systems (especially ones in economically or politically unstable countries) simply because with the increase of random traffic it's harder for a sysadmin to track down a particular user. If you've routed your requests enough times through enough big traffic servers and hopped countries in the process, it's nearly impossible to track down the originating IP of the user. It's actually a very easy thing to do since *nix treats all accounts the same whether their local or remote. Once you have a prompt, you just open a new connection and enter the next IP, and so on until you feel your tracks are covered. However, each hop adds latency and even with a command line interface, you'll start feeling the lag pretty quick, particularly once you start making trans-atlantic or trans-pacific hops.

Link to comment
Share on other sites

True.... but look at the definition of a proxy:

 

prox·y

n. pl. prox·ies

 

1. A person authorized to act for another; an agent or substitute.

2. The authority to act for another.

3. The written authorization to act in place of another.

 

··········································

2. The management of another's affairs.

3. The instrument by which a person is empowered to transact the affairs of another; a proxy.

 

······························

 

So, a proxy doesn't necessarily have to have a socks v4/5, SSL, SSH, or any other tunneling software on it. Nor does it have to encrypt or be configured to specifically hide your traffic. As you said, the act of simply going through multiple computers makes the request header so long and random that it's very hard to track down the originator. IP spoofing can be done with another computer that has as little as a RSH/RLogin server running (remote shell). To track a request that has been done as you described (just for other's education) the person would have to ask the sysadmin (a) to look at their logs.... which the sysadmin would tell the person that the request came to him from this person (B).... the person would then have to ask sysadmin (B) where they got the request from and so on..... a very long and drawn out, time taking process.

Link to comment
Share on other sites

Guest angry xbox
Originally posted by Misteraven

Actually IP spoofing doesn't require a proxy server specifically, just shell access to a server. You're just masking the originating IP information by making requests through a different route. Each path lays on a new layer of IP information. Generally you spoof using Proxy servers or University systems (especially ones in economically or politically unstable countries) simply because with the increase of random traffic it's harder for a sysadmin to track down a particular user. If you've routed your requests enough times through enough big traffic servers and hopped countries in the process, it's nearly impossible to track down the originating IP of the user. It's actually a very easy thing to do since *nix treats all accounts the same whether their local or remote. Once you have a prompt, you just open a new connection and enter the next IP, and so on until you feel your tracks are covered. However, each hop adds latency and even with a command line interface, you'll start feeling the lag pretty quick, particularly once you start making trans-atlantic or trans-pacific hops.

 

actually there is no need to make a transatlantic hop and if you do make one it is possible to avoid latency to the point where its peresence is unnoticable. Transatalantic hops usually work on some very high fiberoptical networks that run on an OC-*** type connection. Now you dont have to hop through that shit though, if you are resourceful enough you can use the many millions of miles of optical and VC networking in this very country to fuck those assholes real good. now i dont know how to do it but ima ask my pops on what simple commands can be used to relay pinging of thier systems. what i mean about above is that the us has a ver y large system of networking above and below ground and not to mention tht if you can get associated with DNS then you might be able to do some damage.

Link to comment
Share on other sites

Guest angry xbox
Originally posted by Dirty_habiT

"Poisoining" BIND servers is a good way to fuck everything up.

 

And xbox, you didn't have to quote the post, you coulda just addressed the aspects that you felt needed addressing.

 

sorry its become a "dirty habit".

 

ahahaahah

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

×
×
  • Create New...