Email hacking

Posted on:
tags: , , , ,

How Email Works?
Email sending and receiving is controlled by the Email servers. All Email service providers configure Email Server before anyone can Sign into his or her account and start communicating digitally. Once the servers are ready to go, users from across the world register in to these Email servers and setup an
Email account. When they have a fully working Email account, they sign into their accounts and start connecting to other users using the Email services.

Email Travelling Path
Let’s say we have two Email providers, one is and other is, ABC is a registered user in and XYZ is a registered user in

ABC signs in to his Email account in, he then writes a mail to the and click on Send and gets the message that the Email is sent successfully.

But what happens behind the curtains, the Email from the computer of is forwarded to the Email server of Server1 then looks for on the internet and forwards the Email of the for the account of XYZ. receives the Email from and puts it in the account of XYZ.

XYZ then sits on computer and signs in to her Email account. Now she has the message in her Email inbox.

Email Service Protocols
SMTP stands for Simple Mail Transfer Protocol. SMTP is used when Email is delivered from an Email client, such as Outlook Express, to an Email server or when Email is delivered from one Email server to another. SMTP uses port 25.

POP3 stands for Post Office Protocol. POP3 allows an Email client to download an Email from an Email server. The POP3 protocol is simple and does not offer many features except for download. Its design assumes that the Email client downloads all available Email from the server, deletes them from the server and then disconnects. POP3 normally uses port 110.

IMAP stands for Internet Message Access Protocol. IMAP shares many similar features with POP3. It, too, is a protocol that an Email client can use to download Email from an Email server. However, IMAP includes many more features than POP3. The IMAP protocol is designed to let users keep their Email on the server. IMAP requires more disk space on the server and more CPU resources than POP3, as all Emails are stored on the server. IMAP normally uses port 143.

Configuring an Email Server
Email server software like Post cast Server, Hmailserver, Surge mail, etc can be used to convert your Desktop PC into an Email sending server.
HMailServer is an Email server for Microsoft Windows. It allows you to handle all your Email yourself without having to rely on an Internet service provider (ISP) to manage it. Compared to letting your ISP host your Email, HMailServer adds flexibility and security and gives you the full control over spam protection.

Email Security
Now let’s check how secure this fast mean of communication is. There are so many attacks which are applied on Emails. There are people who are the masters of these Email attacks and they always look for the innocent peoplewho are not aware of these Email tricks and ready to get caught their trap.

You have to make sure that you are not an easy target for those people. You have to secure your Email identity and profile, make yourself a tough target.

If you have an Email Id Do not feel that it does not matters if hacked because there is no important information in that Email account, because you do not know if someone gets your Email id password and uses your Email to send a threatening Email to the Ministry or to the News Channels.

Attacker is not bothered about your data in the Email. He just wants an Email ID Victim which will be used in the attack. There are a lots of ways by which one can use your Email in wrong means, i am sure that you would have come across some of the cased where a student gets an Email from his friends abusing him or cases on Porn Emails where the owner of the Email does not anything about the sent Email.

Email Spoofing
Email spoofing is the forgery of an Email header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately.

There are so many ways to send the Fake Emails even without knowing the password of the Email ID. The Internet is so vulnerable that you can use anybody's Email ID to send a threatening Email to any official personnel.

Methods to send fake Emails
Open Relay Server
Web Scripts

Fake Emails: Open Relay Server
An Open Mail Relay is an SMTP (Simple Mail Transfer Protocol) server configured in such a way that it allows anyone on the Internet to send Email through it, not just mail destined ‘To’ or ‘Originating’ from known users.
An Attacker can connect the Open Relay Server via Telnet and instruct the server to send the Email.
Open Relay Email Server requires no password to send the Email.

Fake Emails: via web script
Web Programming languages such as PHP and ASP contain the mail sending functions which can be used to send Emails by programming Fake headers i.e.” From: To: Subject:”
There are so many websites available on the Internet which already contains these mail sending scripts. Most of them provide the free service.

Some of Free Anonymous Email Websites are:
Ø (Send attachments as well)

No comments:

Post a Comment

< >