I had written in a previous article how to send “spoofed” e-mail, but it does not go in much depth in regards to how to hide yourself, and/or creative uses for such an application. Well, here is a complete “redo” in regards to how one should install/use the given applications in Windows, and in Linux. Let us first start off with Windows – the easy way.

Windows:

Seriously, this is painfully easy, and makes me cry at night. To send “spoofed” e-mail from one account, to another without a trace, perform the following.

Download tor:

Litterly, just install it. It is self explanatory. Same goes for the next step; installing privoxy.

Download privoxy here:

Install privoxy, choose all default. At this point, simply execute tor, then privoxy. They begin to run, oh happy day. To the contrary, I do believe that there is a bundled package called vidalia, which may be found via google, and it installs/configures both for you. Regardless, both methods work quite swimingly.

Acquire PuTTY:

On to the next step, acquire PuTTY. Why PuTTY? Well, this is an amazing open source, all in one application that allows you to connect to any such command-line related server, along with many options. The option we shall utilize in this case will be the “proxy” section. Allow us to configure.

So it would seem (since I last checked) smtp.sbcglobal.net, at least for AT&T DSL subscribers, is all of a sudden allowing open relay on their server. Yes, I was surprised as well. What is open relay? It is when you may specify any sort of e-mail domain as the recipient/mailer without being bound to only the domain's address; which in this case it would be bound to sbcglobal.net. Luckily, at least for the time being, any domain goes. Allow us to proceed. Here is a brief rundown of the configuration.

The Spoofing:

Session > Host Name ( or IP address ): smtp.sbcglobal.net Port: 25 Explanation for the prior mentioned command: smtp.sbcglobal.net is the address for my SMTP (simple mail transfer protocol) which is my “mail carrier.” If you need a list of SMTP carriers, check this link: In terms of the port, 25 is the standard SMTP port used by major e-mail servers.

Connection > Proxy > Proxy Type: Check Socks5

Proxy hostname: 127.0.0.1 Port: 9050

That's it, now if privoxy/tor are running, you may connect to the SMTP and begin to send your e-mail. As a brief overview, this is how you send e-mail via telnet.

Type: helo smtp_server's_name_goes_here

mail from: [email protected]

rcpt to: [email protected]

data

Subject: Whatever here

Type whatever you please here.

(enter)

(enter)

.

(enter)

Note: I hit enter, and then enter again, then hit a period, then enter yet again. This enables you to send the message. If all goes accordingly, your e-mail has been spoofed, and protected from the end user reading the header, and determining that it was sent via your IP address.

Linux:

Download the following, and compile the source:

Tor:

Privoxy:

PuTTY:

Or... depending on your distribution:

Debian:

apt-get install tor

apt-get install privoxy

Gentoo:

emerge tor

emerge privoxy

For source install of tor:

cd to the tarball, type: tar -xzf tor-0.1.2.18.tar.gz

cd tor-0.1.2.18

./configure && make

sudo make install

If you make install, that means that it makes an environmental variable, so you may type tor anywhere in the terminal, and it will execute it. Since it runs in the parent window, we want to assign it to a screen so we can close the terminal at anytime. In that case, type: tor&

If you need to kill the application, type as root: killall tor

To install the privoxy source:

tar -xzf privoxy-3.0.7-beta-src.tar.gz

cd privoxy-3.0.7-beta

./configure

make

sudo make install

Now, we need to configure the proxy; type: sudo nano /etc/privoxy/

Add this line: forward-socks4a / 127.0.0.1:9050 .

(Note the period at the end, quite important).

Now, if you receive some configuration error, such as: Fatal error: can't check configuration file '/usr/sbin/config': No such file or directory, then you may need to make a new configuration file. Type: sudo nano /usr/sbin/config, and add the line forward-socks4a / 127.0.0.1:9050 .

Now, cd /usr/sbin, and type: ./privoxy

Install PuTTY by:

cd to the directory that holds: putty-0.60.tar.gz

cd putty-0.60

cd unix

./configure

make

sudo make install

You are all done, now go back to the step within windows, labeled: “The Spoofing.” Of course, this is after acquiring/installing PuTTY.

Have fun, don't do anything malicious, and I do not take responsibility for your reckless decisions.

-leetupload