BOOK THIS SPACE FOR AD
ARTICLE ADI n order to do these kinds of attacks/pranks. Websites will make you pay a fee for it. Today you will learn how to make it private, secure, and free.
Disclaimer: Use it at your own risk. Do not use this for Spam or harm others.
How many times did you dream of pranking a friend, family member, or co-worker with an import e-mail? Let us say sending out an E-mail to others that looks like is coming from Donald Trump or Obama? Well, now you can do it. Only — if you want to make pranks. What about hacking wise?
After reading some harsh comments from people with little or no knowledge at all of how cybersecurity work, I deduced that many of them think we need superpowers and crazy skills to hack. People are failing to realize and understand, that hackers exist just because others make mistakes. how? whenever setting up networks, writing code, apps, developing software, or the biggest mistake of all — people trusting others.
Social engineering is the art of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases, the attacker never comes face-to-face with the victim. Social engineering using impersonation (e.g. to gain information over the phone, or to gate-crash) is
known informally as blagging. In addition to criminal purposes, social engineering has also had been employed by debt collectors, skip tracers, private investigators, bounty hunters, and tabloid journalists. A study by Google researchers found that up to 90 percent of all domains involved in distributing fake antivirus software used social engineering techniques.
Using the following script, we can send E-mails impersonating anyone from within a company. Companies hosting Bug Bounty program do not accept these types of attacks as valid reports. For the simple fact that these attacks have a very high chance of succeeding.
This script concept is very simple and self-explanatory. Using more advanced code features, you will have the possibility to attach documents, photos, or any type of file you want.
As you can see from the photo, you will only have the option to send E-mails. The receiving end cant reply back. No, that this will stop hackers from harming others, as you can just add a link to any malicious site alone with your message body.
Make an account in a website like www.000webhosting.com, go to “upload files” and in the public directory make a file, name it index.php. inside this file paste the code, and that’s it
Have fun!