Skip to main content

An idea for Net Hacking.....

An active internet connection (an embarrasing stage to miss sometimes!)

The address of a mail server capable of relaying for you - usually provided by your dialup provider (e.g. mail.domain.ext)

A valid email address (e.g. mail@domain.ext)

The first thing to do is to open a connection from your computer to your mail server.

telnet mail.domain.ext 25

You should receive a reply like:

Trying ???.???.???.???...

Connected to mail.domain.ext.

Escape character is '^]'.

220 mail.domain.ext ESMTP Sendmail ?version-number?; ?date+time+gmtoffset?



You will then need to delcare where you are sending the email from:

HELO local.domain.name - dont worry too much about your local domain name although you really should use your exact fully qualified domain name as seen by the outside world the mail server has no choice but to take your word for it as of RFC822-RFC1123.

This should give you:

250 mail.domain.ext Hello local.domain.name [loc.al.i.p], pleased to meet you



Now give your email address:

MAIL FROM: mail@domain.ext

Should yeild:

250 2.1.0 mail@domain.ext... Sender ok

If it doesn't please see possible problems.



Now give the recipients address:

RCPT TO: mail@otherdomain.ext

Should yeild:

250 2.1.0 mail@otherdomain.ext... Recipient ok

If it doesn't please see possible problems.



To start composing the message issue the command DATA



If you want a subject for your email type Subject:-type subject here- then press enter twice (these are needed to conform to RFC 882)



You may now proceed to type the body of your message (e.g. hello mail@otherdomain.ext from mail@domain.ext)



To tell the mail server that you have completed the message enter a single "." on a line on it's own.

The mail server should reply with: 250 2.0.0 ???????? Message accepted for delivery



You can close the connection by issuing the QUIT command.

The mailserver should reply with something like:221 2.0.0 mail.domain.ext closing connection

Connection closed by foreign host.

mr lucknow 11/1/2006 8:17 AM Here are a list of problems I've encountered and their fixes
501 nouser@nosuchplace.here... Sender domain must exist
The domain that you are sending from must exist

503 Need MAIL before RCPT
A recipient has been specified before a sender.

550 mail@domain.ext... Relaying Denied
The mail server has refused to relay mail for you, this may be for any number of reasons but typical resons include:
Not using this provider for an internet connection and/or
Not using an email address provided by the owner of the server.

Some things to watch out for:
1. If you type too quickly, sometimes it won't recognise your text (weird!)
2. The backspace key sometimes does not work with some telnet clients (even though it may seem as though it does)

I'll be putting more as and when I get them and figure out how to fix each problem

 

Comments

Popular posts from this blog

Incoming and Outgoing Mail Server Settings..

Email Provider IMAP Settings POP Settings SMTP Settings AOL (including Verizon.net) Server: imap.aol.com Port: 993 Encryption: SSL/TLS Server: pop.aol.com Port: 995 Encryption: SSL/TLS Server: smtp.aol.com Port: 465 Encryption: SSL/TLS Gmail Server: imap.gmail.com Port: 993 Encryption: SSL/TLS Server: pop.gmail.com Port: 995 Encryption: SSL/TLS Server: smtp.gmail.com Port: 465 Encryption: SSL/TLS iCloud Server: imap.mail.me.com Port: 993 Encryption: SSL/TLS Server: Port: Encryption: Server: smtp.mail.me.com Port: 587 Encryption: STARTTLS MSN Server: imap-mail.outlook.com Port: 993 Encryption: SSL/TLS Server: pop-mail.outlook.com Port: 995 Encryption: SSL/TLS Server: smtp-mail.outlook.com Port: 587 Encryption: STARTTLS Microsoft 365 Server: outlook.office365.com Port: 993 Encryption: SSL/TLS Server: outlook.office365.com Port: 995 Encryption: SSL/TLS Server: smtp.office365.com Port: 587 Encryption: STARTTLS Outlook.com Hotmail.com Live.com Server: outlook.office365.com Port: 993 Encrypt

How to Break Email Accounts......

Disclaimer : I do not endorse Hacking ! This is meant for educational purpose only ! I want u to know how others can try break into your Personal life ! Beware !! Introduction I have written this tutorial to address a question that is all too commonly asked in any channel/chat room with "hack" in the title (asked in frequency to the point of harrassment really). So since this is a question that so many people ask, then I believe that there should at least be an answer available (regardless of the morality or "lameness" of such a question). So you as the reader are most likely reading this because you want to break into somebody's email account. Well, you must understand that there is no 1-2-3 process to anything. I will give you options to consider when persuing such a task, but it will ultimately be up to you to do this. This is what you want to do, and no matter what sort of offers you throw up at anybody, nobody is going to do this for you. There is no progra

Trojan Trojan !! What is it ?

Its All Explained Here Trojan horse well this term has many meanings . In the context of computer software, a Trojan horse is a malicious program that is disguised as or embedded within legitimate software. The term is derived from the classical myth of the Trojan Horse. They may look useful or interesting (or at the very least harmless) to an unsuspecting user, but are actually harmful when executed. Often the term is shortened to simply Trojan, even though this turns the adjective into a noun, reversing the myth (Greeks were gaining malicious access, not Trojans). There are two common types of Trojan horses. One, is otherwise useful software that has been corrupted by a cracker inserting malicious code that executes while the program is used. Examples include various implementations of weather alerting programs, computer clock setting software, and peer to peer file sharing utilities. The other type is a standalone program that masquerades as something else, like a game or image file