-: EMail Hacking :-All email communications on the internet are possible by two protocols: 1) Simple Mail Transfer Protocol (SMTP port-25) 2) Post Office Protocol (POP port-110) E-Mail hacking consists of various techniques as discussed below. 1) EMail Tracing :- Generally, the path taken by an email while travelling from sender to receiver can be explained by following diagram. The most effective and easiest way to trace an email is to analyze it's email headers. This can be done by just viewing the full header of received email. A typical email header looks something like this: The above email header gives us the following information about it's origin and path: a) Sender's email address :- atiles@destatis.de b) Source IP address :- 141.203.33.92 c) Source mail server :- dsl-189-160-34-89.prod-infinitum.com.mx d) Email client :- Thunderbird 2.0.0.6 |
Tuesday, 11 October 2011
-: EMail Hacking :-
Labels:
-: EMail Hacking :-
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment