Wednesday, October 13, 2010

SMS Spoofing - falsified the sender's SMS

Several years ago, everybody amused themselves by sending e-mails as bill.gates @ microsoft.com. Today, the majority of the society quick exchange of messages is associated rather with SMS, not e-mail. Unfortunately, the new communication protocols used in GSM networks are just as vulnerable as the old and worn-out SMTP. Today we look at the falsification of the sender field in SMS messages and threats that this brings. We will learn also how to recognize fake SMS messages.

How to fake a sender field in the SMS?

The easiest way is to use one of the sites goals. Virtually none of them is now available free services, but they are not especially expensive.

Attacks (smashing and threats)

Please note that by sending SMS with a false sender does not have a return channel (any attempt to answer the sacrifice of our SMS will be forwarded to the original owner of the number, and not to us). Thus, all attacks consist mainly was to get the victim to perform some action (phishing, threats).

Doubling as the number of technical director can instruct the employee such as the IT department to open port on your company's firewall. Pretending to be a person close to the victim can ask to transfer money to the specified in the SMS account number ... Finally, you can send yourself a text message with the number of the boss (wife), containing information on the increase (an invitation to dinner), and strongly demand the promise.

ID theft websites

another group of attack is the possibility of identity theft and publishing content on behalf of another user on one of the websites where the attacked user has an account (if the service allows you to add content via SMS / MMS). In Poland, it can be: Our-Class, Blip and Flakers (and probably many others). If you have a website associated with that phone number to sending fake SMS to a service access number will update the content in the profile of the victim. Service thought that the author of SMS is its user (and not the gateway).

Monday, October 11, 2010

IP and Email Spoofing - easy to understand

Many email users are not adept at using e-mail received junk mail in the office or personal email as a result of misuse of IP spoofing. This causes all email users are uncomfortable and cause dissatisfaction when their email account is filled with junk mail.

The spread of junk mail has increased the awareness of the email server administrator to install anti-spam software. There are a lot of software on the Internet from either a paid or open source. However, junk mail senders are always looking for new techniques or weaknesses that exist in an anti-spam software.

IP Spoofing: I sent an e-mailed to you. In this case, the correct IP address can be easily seen by the recipient. You can keep track of me very easily based on the ip address. So if I want to hide my identity I will spoof the IP address first and then send an e-mailed to you. IP spoofing is to hide your real IP address and show a fake IP address to the sender's Internet Protocol.


Email Spoofing: Email Spoofing is a method where we can send e-mail to anyone with an e-mail address to display other people. I want to make an impression on my friend. I sent an e-mail from another account using the email address spoofing, and display billing gateway into my account. My friends will be shocked to see this email.