Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Spoofing, Packet Crafting

Name: Anonymous 2009-07-10 16:19

Hey guys, SRS NEWFAG here. Not a spammer, but curious. Irrespective of php or cgi scripts on websites, and of telnet to open-mail-server, what techniques are available for email spoofing? Again, reiterating the 'NEWFAG'ishness inherent to this inquiry, I have momentarily glanced over the RFC but need some help. Knowing little of the lower level shit involved in the concept, isn't it possible to merely craft a packet with all of the right parameters to quickly and effectively, albeit relatively anonymously spoof an email somewhere while making it look almost completely legit? Essentially the rub lies in that I have been receiving emails which are clearly spoofed. These emails contain hidden messages which are only semantically relevant to me, that is, because I 'get' the context. I am reasonably confident that I know who the individual on the other end of this is, and would like to do the same. However, almost all of the options out there seem to traceback to my ip address, or require my use of a shady server. Is there not a way to achieve the end with a script that crafts a packet, thereby bypassing interfacing directly with open mailservers? I get the impression that the adversary in this situation has written a program which achieves some end similar, and ever email that this entity sends to me, has changed parameters. i.e.- different routes of travel, different aliases, however the 'hidden messages' follow the semantic logic. Ya'll follow?

Name: Anonymous 2009-07-10 17:58

Members of a particular organization are using increasingly a-typical techniques to recruit, coerce, harass, humiliate and occasionally just tease people.  One such method is to spoof emails which upon initial consideration by the unwitting appear only to be spam, but which will contain information semantically relevant to the intended target thereby maintaining a layer of deniability for the antagonist.

The semantically relevant article can range from a single word, to a whole paragraph.  This information can be hidden in the sender name, the sender's domain (i.e. honkeymouthed@hitthatshit.com), the body of the text, the subject line or the mailer information. 

The more particularly advanced examples of this also include a link to a server which corroborates the suggestion that the email is in fact legitimate spam, which however upon closer investigation, is actually a server meant to glean further system information and not actually sell illicit wares.

This is a permutation on the idea of phishing, with the actual intention being communication, harassment or recruitment.

The semantically relevant items/words encoded using techniques such as 'double-entendre', will often have been gleaned utilizing contemporary methods as technical as 'traffic analysis' to methods as old school as 'human asset intelligence collection'.

It is my belief that the aggressors in question are state-sponsored actors, at least in my case, but on a smaller scale this can also be useful for hackers.

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List