[1976] in WWW Security List Archive
Re: hacking
daemon@ATHENA.MIT.EDU (da kewl virus d00dz)
Fri May 3 04:05:00 1996
From: "da kewl virus d00dz" <gstewart@helios.mdex.net>
To: www-security@ns2.rutgers.edu
Date: Thu, 2 May 1996 23:20:03 -0600
Reply-to: mailing@mdex.net
Errors-To: owner-www-security@ns2.rutgers.edu
Telnet into a server that has SMTP support it may have been a pop3
mailer.
when it says:
220 xxxx.xxxx.xxx Smail3.1.29.1 #15 ready at Mon, 10 Jan 96 12:34 EDT
NOTE: those are the servers you look for if you don't want an IP
stamped on the header
then you type:
HELO XYZ.COM
250 mail.serveraddress.com Hello xyz.com <-- the server's reply
MAIL FROM:john@doe.com <-- person the mail is supposedly from
250 john@doe.com> ... Sender Okay
RCPT TO:ceo@excecutive.org <-- person mail is to
250 <ceo@excecutive.com> ... Recipient Okay
data <-- this is the command to enter the txt of the mail
354 Enter mail, end with "." on a line by itself
bleh
..
250 Mail accepted
quit
closing connection...
thats it.
no special telnet client req'd. Sometimes the commands don't work on
the first try.. just type them back in
Byte0
ddp