Art Of Email spoofing

Spam and e-mail-laden viruses can take a lot of the fun and utility out of electronic communications, but at least you can trust e-mail that comes from people you know – except when you can’t. A favorite technique of spammers and other “bad guys” is to “spoof” their return e-mail addresses, making it look as if the mail came from someone else. In effect, this is a form of identity theft, as the sender pretends to be someone else in order to persuade the recipient to do something (from simply opening the message to sending money or revealing personal information). In this article, we look at how e-mail spoofing works and what can be done about it.

If you receive a snail mail letter, you look to the return address in the top left corner as an indicator of where it originated. However, the sender could write any name and address there; you have no assurance that the letter really is from that person and address. E-mail messages contain return addresses, too – but they can likewise be deliberately misleading, or “spoofed.”  Senders do this for various reasons, including:

  • The e-mail is spam and the sender doesn’t want to be subjected to anti-spam laws
  • The e-mail constitutes a violation of some other law (for example, it is threatening or harassing)
  • The e-mail contains a virus or Trojan and the sender believes you are more likely to open it if it appears to be from someone you know
  • The e-mail requests information that you might be willing to give to the person the sender is pretending to be (for example, a sender might pose as your company’s system administrator and ask for your network password), as part of a “social engineering” attack
  • The sender is attempting to cause trouble for someone by pretending to be that person (for example, to make it look as though a political rival or personal enemy said something he/she didn’t in an e-mail message)

How Spoofing Works:

In its simplest (and most easily detected) form, e-mail spoofing involves simply setting by adding the poster and getter name and add the message which you want to send.

Here are the few simple steps to be followed to work with email spoofing:



  • Enter the poster address ( address pretending to be the person you want).
  • Enter getter address ( victim’s address).
  • Enter the subject.
  • Enter the message or text you want to send.
  • Enter the Captcha for conformation and click on send. Your mail will be sent to victim pretending as the person you want.

Your mail will be sent to victim pretending as the person you want to.

CAUTION:This post is  just for getting a basic idea about Email SPOOFING, I bear no responsibility if some mischief is done. In some countries Email spoofing is illegal so I request you all not to use this service in banned countries. 


4 thoughts on “Art Of Email spoofing

  1. Hello, i feel that i saw you visited my weblog so i got here to “go back the choose”.I am trying to find things to improve my web site!I suppose its adequate to use a few of your concepts!!

  2. Attractive portion of content. I simply stumbled upon your weblog and in accession capital to say that I get actually loved
    account your weblog posts. Any way I will be subscribing on your
    feeds and even I achievement you get entry to persistently fast.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s