boogie hands Posted September 21, 2002 Share Posted September 21, 2002 ive been on the internet for about 15 minutes and every minute i get an email form the same company with a different address...basically i cant block it and ive already deleted 250 emails from my box....i have a bit of free time today and was just curious if there is some type of program i can use to shoot a few 1000 emails over to these wonderful people....mabey even something a little more fun if there are any suggestions.... let me know...im annoyed Link to comment Share on other sites More sharing options...
rip Posted September 21, 2002 Share Posted September 21, 2002 Originally posted by boogie hands ive been on the internet for about 15 minutes and every minute i get an email form the same company with a different address...basically i cant block it and ive already deleted 250 emails from my box....i have a bit of free time today and was just curious if there is some type of program i can use to shoot a few 1000 emails over to these wonderful people....mabey even something a little more fun if there are any suggestions.... let me know...im annoyed first............... wuddup bitches................... go buy some spam and mail it to them. Link to comment Share on other sites More sharing options...
Guest socrates Posted September 21, 2002 Share Posted September 21, 2002 Just reply a shit load of times Link to comment Share on other sites More sharing options...
rip Posted September 21, 2002 Share Posted September 21, 2002 ok seriously easy way. go find a spamming program you dipshit. jesus christ. Link to comment Share on other sites More sharing options...
Guest Pilau Hands Posted September 21, 2002 Share Posted September 21, 2002 whoa sparkplug! ^^^ i think we got a live one! Link to comment Share on other sites More sharing options...
boogie hands Posted September 21, 2002 Author Share Posted September 21, 2002 Originally posted by rip ok seriously easy way. go find a spamming program you dipshit. jesus christ. wow...arent we feeling sassy today? did daddy forget to hug you before he left for work??? aaaaaaaaaawwwwwwwww... Link to comment Share on other sites More sharing options...
rip Posted September 21, 2002 Share Posted September 21, 2002 ok well seriously just like think it trhew before you post a question. Link to comment Share on other sites More sharing options...
Ronnie Dobbs Posted September 21, 2002 Share Posted September 21, 2002 its all about annonomous email spammers Link to comment Share on other sites More sharing options...
Dirty_habiT Posted September 21, 2002 Share Posted September 21, 2002 Ok Boogie, as you already know we have a lot of stupid fucks running around in here. I can maybe help you. The way in which those spammers email you is from weird email addresses that are either not a person's email, or your reply will get bounced back at you because the address is "nonexistent." The reason this happens is because they have tweaked the headers of the message. Anyway, don't worry about that. Is your email address a hotmail? The best thing to do is to talk to your system administrator (if it's not hotmail, and it's a shell account), and tell him to block the offensive party's domain. If it is hotmail, you can block domains instead of individual addresses..... if you are getting alot of emails from different "users" at the same domain, ie. "relentlessmailers.cz", block that domain instead of trying to blcok every user, that way it will get rid of all of them..... Another thing, pay attention to the places on the web that you give your email address to. If your looking at porn sites, sometimes they can "steal" your email address off of your computer, and you'll be getting spammed before you know it. One more thing.... there are these things called "web bugs." It can be a tiny tiny 2 x 2 pixel gif image on an email or webpage. It's kind of like a spy. So if you get spam in your email box, and then you view it, the web bug activates and can do a number of things, including telling the sending party that the email address that they spammed is active.... just from viewing. The best thing to do is to just delete spam without reading at all, I know how tempting that free cellphone or trip to the virgin islands sounds.... it's a scam to hose your email box. Link to comment Share on other sites More sharing options...
I Luv Roo Posted September 21, 2002 Share Posted September 21, 2002 I work at an Anti Spam company. I filter that shit all day long.... aargh! I guess your email is not one of our customers though. It used to be that a total geek would be the only one with enough nerdiness to know the spamming techniques, but now the software is for sale, and easy to use, so everybody sends bulk email to everyone. It's increased by like 70% - but since it's work I never pay attention to the statistics.... You can buy a spammer CD with millions of harvested email addresses on them. How they get the email address is they use a program called Spider (or something like it) to do a web search for anything with an @ sign which is usually an email account. Then they put those addresses in the BCC header, and they forge another user in the from header, so you can't consistently block the spam. Then they constantly search around for open relays and use those open relays to send out their spam, and disguise all the headers enough so you don't really know where its coming from. It will be different to contantly spam just ONE user or domain. If you really want to spam these people back, learn 'sendmail' a unix based email program, and figure out how to send what's called a 'denial of service attack'. This is stuff I do not know how to do because I'm just a worker-bee and I don't know unix very well. But I hope that was somewhat helpful, boogie. I try every now and then, what with the photo advice and all... Link to comment Share on other sites More sharing options...
Intangible Posted September 21, 2002 Share Posted September 21, 2002 computers suck....fuck email....:D Link to comment Share on other sites More sharing options...
Guest uncle-boy Posted September 21, 2002 Share Posted September 21, 2002 Originally posted by boogie hands wow...arent we feeling sassy today? did daddy forget to hug you before he left for work??? aaaaaaaaaawwwwwwwww... :lol:....sassy.....hahahahahahahaah :lol: Link to comment Share on other sites More sharing options...
Dirty_habiT Posted September 21, 2002 Share Posted September 21, 2002 Roo's got the inside info. I've logged into sendmail on my own server before using telnet. If you know how to do it, yes it does take some learning, you can send a message that says it's from a different address than the one that really sent it. Another thing to do is learn how to look at the headers on an email..... there are many tutorials on the net that can tell you what you're looking at. View the headers as "full headers." Doing so will help you figure out where the email is really coming from. Roo: those spider things that you were talking about.... they're also known as web "robots." They "crawl" websites to find certain types of content. You can block spiders with some simple perl scripts..... One example of how a robot is used: Search engines like yahoo and lycos, etc. use robots to find content, and then use what they find to determine what category or search criteria should be entered to find the appropriate page. Link to comment Share on other sites More sharing options...
Guest angry xbox Posted September 22, 2002 Share Posted September 22, 2002 Originally posted by boogie hands wow...arent we feeling sassy today? did daddy forget to hug you before he left for work??? aaaaaaaaaawwwwwwwww... bwuahahahahahahahahahah Link to comment Share on other sites More sharing options...
rip Posted September 22, 2002 Share Posted September 22, 2002 unix is a pain in the ass. if you dont know what you want from it. Link to comment Share on other sites More sharing options...
boogie hands Posted September 22, 2002 Author Share Posted September 22, 2002 see rip?? i actually got some information from certain people on this board just like i had hoped....golly, who would have thought.... you really need to understand that just because your a complete idiot doesnt mean every one else is on the same boat....instead of trying to be an internet bad ass you may want to focus your time on keeping your mouth closed and making a list of what you want for your 16th birthday.... thank you Link to comment Share on other sites More sharing options...
boogie hands Posted September 22, 2002 Author Share Posted September 22, 2002 thank you to i love roo (once again..your always on the ball) and dirty for a little knowledge.... i just found a spam program on astalavista that sounds like it will get the job done while hidding my actual IP address...mabey when i sober up ill get it loaded up and fuck with a few offenders.... i swear...spam is so obnoxious Link to comment Share on other sites More sharing options...
I Luv Roo Posted September 22, 2002 Share Posted September 22, 2002 PING OR... you can just ping someone. Log on to a bunch of computers and ping the domain all at the same time, and don't stop the process. That's the sort of cheap easy way, but you don't really know if it is working... I guess pinging just floods them to a certain extent. All you do is type ping (domain name or IP address) at the Unix shell prompt, and there you have it. Super easy. Try it and tell me what happened... Oh yeah, if I ever did any of this stuff, I wouldn't just be fired, I'd probably be prosecuted or the pants sued off me. g'night kids! Link to comment Share on other sites More sharing options...
Dirty_habiT Posted September 22, 2002 Share Posted September 22, 2002 no problem. Who's the internet bad ass now rip? Link to comment Share on other sites More sharing options...
Dirty_habiT Posted September 22, 2002 Share Posted September 22, 2002 Roo: That ping thing that you said up there.... it works alright that way.... but there is a much better way. I don't know if any one here reads 2600 magazine, but they usually have some pretty good technogeek infos on various computer/wireless related stuffs. Well, I'll link to the most recent magazine's TOC, the article "Getting Into Cisco Routers" has a ping command that is more tailored to what Roo is trying to get you to do. Although, you cannot read the article online, the magazine is only $5 at Barnes and Noble. Another really good computer security related link is Security Focus. Check out the "basics" area, they have some easier to grasp ideas in that section.... anyway the link.... http://www.2600.com/covers/su021.gif'> Link to comment Share on other sites More sharing options...
boogie hands Posted September 22, 2002 Author Share Posted September 22, 2002 i learned about the whole ping thing (i believe its refered to as "ip spoofing") through various networking courses ive taken....not really trying to get into all of that though....just want to send a few fuck yous to various people who have wasted 2 or 3 minutes of my time Link to comment Share on other sites More sharing options...
Dirty_habiT Posted September 22, 2002 Share Posted September 22, 2002 no no no no no.... IP spoofing is the process of "bouncing" requests through multiple proxy servers, much in the same way those spammers prevent you from emailing them back, to hide the identity of the originating machine. There are various other methods of spoofing IPs as well. Link to comment Share on other sites More sharing options...
boogie hands Posted September 22, 2002 Author Share Posted September 22, 2002 hahahha....ok, im just going to quit right there.... can i use the fact that i graduated from that course over a year ago as and excuse??? Link to comment Share on other sites More sharing options...
Dirty_habiT Posted September 22, 2002 Share Posted September 22, 2002 Heh. Sure. Really though, you (and anyone else) should check out that magazine I posted. It will make you a better person. Link to comment Share on other sites More sharing options...
Guest 150's~ Posted September 22, 2002 Share Posted September 22, 2002 kill someone pussy. Link to comment Share on other sites More sharing options...
misteraven Posted September 22, 2002 Share Posted September 22, 2002 Actually IP spoofing doesn't require a proxy server specifically, just shell access to a server. You're just masking the originating IP information by making requests through a different route. Each path lays on a new layer of IP information. Generally you spoof using Proxy servers or University systems (especially ones in economically or politically unstable countries) simply because with the increase of random traffic it's harder for a sysadmin to track down a particular user. If you've routed your requests enough times through enough big traffic servers and hopped countries in the process, it's nearly impossible to track down the originating IP of the user. It's actually a very easy thing to do since *nix treats all accounts the same whether their local or remote. Once you have a prompt, you just open a new connection and enter the next IP, and so on until you feel your tracks are covered. However, each hop adds latency and even with a command line interface, you'll start feeling the lag pretty quick, particularly once you start making trans-atlantic or trans-pacific hops. Link to comment Share on other sites More sharing options...
Dirty_habiT Posted September 22, 2002 Share Posted September 22, 2002 True.... but look at the definition of a proxy: prox·y n. pl. prox·ies 1. A person authorized to act for another; an agent or substitute. 2. The authority to act for another. 3. The written authorization to act in place of another. ·········································· 2. The management of another's affairs. 3. The instrument by which a person is empowered to transact the affairs of another; a proxy. ······························ So, a proxy doesn't necessarily have to have a socks v4/5, SSL, SSH, or any other tunneling software on it. Nor does it have to encrypt or be configured to specifically hide your traffic. As you said, the act of simply going through multiple computers makes the request header so long and random that it's very hard to track down the originator. IP spoofing can be done with another computer that has as little as a RSH/RLogin server running (remote shell). To track a request that has been done as you described (just for other's education) the person would have to ask the sysadmin (a) to look at their logs.... which the sysadmin would tell the person that the request came to him from this person (B).... the person would then have to ask sysadmin (B) where they got the request from and so on..... a very long and drawn out, time taking process. Link to comment Share on other sites More sharing options...
Guest angry xbox Posted September 22, 2002 Share Posted September 22, 2002 Originally posted by Misteraven Actually IP spoofing doesn't require a proxy server specifically, just shell access to a server. You're just masking the originating IP information by making requests through a different route. Each path lays on a new layer of IP information. Generally you spoof using Proxy servers or University systems (especially ones in economically or politically unstable countries) simply because with the increase of random traffic it's harder for a sysadmin to track down a particular user. If you've routed your requests enough times through enough big traffic servers and hopped countries in the process, it's nearly impossible to track down the originating IP of the user. It's actually a very easy thing to do since *nix treats all accounts the same whether their local or remote. Once you have a prompt, you just open a new connection and enter the next IP, and so on until you feel your tracks are covered. However, each hop adds latency and even with a command line interface, you'll start feeling the lag pretty quick, particularly once you start making trans-atlantic or trans-pacific hops. actually there is no need to make a transatlantic hop and if you do make one it is possible to avoid latency to the point where its peresence is unnoticable. Transatalantic hops usually work on some very high fiberoptical networks that run on an OC-*** type connection. Now you dont have to hop through that shit though, if you are resourceful enough you can use the many millions of miles of optical and VC networking in this very country to fuck those assholes real good. now i dont know how to do it but ima ask my pops on what simple commands can be used to relay pinging of thier systems. what i mean about above is that the us has a ver y large system of networking above and below ground and not to mention tht if you can get associated with DNS then you might be able to do some damage. Link to comment Share on other sites More sharing options...
Dirty_habiT Posted September 22, 2002 Share Posted September 22, 2002 "Poisoining" BIND servers is a good way to fuck everything up. And xbox, you didn't have to quote the post, you coulda just addressed the aspects that you felt needed addressing. Link to comment Share on other sites More sharing options...
Guest angry xbox Posted September 22, 2002 Share Posted September 22, 2002 Originally posted by Dirty_habiT "Poisoining" BIND servers is a good way to fuck everything up. And xbox, you didn't have to quote the post, you coulda just addressed the aspects that you felt needed addressing. sorry its become a "dirty habit". ahahaahah Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.