[1976] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: hacking

daemon@ATHENA.MIT.EDU (da kewl virus d00dz)
Fri May 3 04:05:00 1996

From: "da kewl virus d00dz" <gstewart@helios.mdex.net>
To: www-security@ns2.rutgers.edu
Date:          Thu, 2 May 1996 23:20:03 -0600
Reply-to: mailing@mdex.net
Errors-To: owner-www-security@ns2.rutgers.edu

Telnet into a server that has SMTP support it may have been a pop3 
mailer. 

when it says:
220 xxxx.xxxx.xxx Smail3.1.29.1 #15 ready at Mon, 10 Jan 96 12:34 EDT 
NOTE: those are the servers you look for if you don't want an IP 
stamped on the header

then you type:

HELO XYZ.COM
250 mail.serveraddress.com Hello xyz.com  <-- the server's reply  
MAIL FROM:john@doe.com <-- person the mail is supposedly from
250 john@doe.com> ... Sender Okay   
RCPT TO:ceo@excecutive.org <-- person mail is to
250 <ceo@excecutive.com> ... Recipient Okay   
data <-- this is the command to enter the txt of the mail
354 Enter mail, end with "." on a line by itself  
bleh
..
250 Mail accepted    
quit
closing connection...

thats it.
no special telnet client req'd. Sometimes the commands don't work on 
the first try.. just type them back in
 
Byte0
ddp

home help back first fref pref prev next nref lref last post