Re: How Did This Get Done?
---------------------------------------------------------------------------- Path: io.org!sun.cais.com!news.sprintlink.net!tequesta.gate.net!sysop From: no_more_faggots@faggots.must.die.com <===== Is this a trick? Newsgroups: alt.sex.stories Subject: NO MORE FAGGOT STORIES! Date: 5 Sep 1994 21:13:00 GMT Lines: 1 Message-ID: <34g1ks$jn1@tequesta.gate.net> NNTP-Posting-Host: hopi.gate.net
NO MORE FAGGOT STORIES DAMMIT -----------------------------------------------------------------------------
How the hell did the poster "customize" his address to ...ummm...fit the post???
not hard at all...by telnetting in to port 25 of a system on the net, you can talk directly to that systems sendmail...mail is passed in ascii format...few systems require a HELO (identifying the system telnetting in)...then you simply type in the mail headers manually...combine this with the fact that some systems let you post to usenet by email, and you can do just about anything and be untraceable (i think, anyone know for sure?)... i am sure that there are other ways to do this...i don't know how usenet news is passed, but i suspect this is also done in a similar way so if you know the port number and the format, you could do it like that... Skat
On Tue, 6 Sep 1994 nobody@shell.portal.com wrote:
i am sure that there are other ways to do this...i don't know how usenet news is passed, but i suspect this is also done in a similar way so if you know the port number and the format, you could do it like that...
With my SLIP software, I can set my domain name to be anything I want. When first implementing it I even made a mistake which gave me a name of sersol..com - note the two periods in succession. It would put out anything else as well. -NetSurfer #include standard.disclaimer
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> == = = |James D. Wilson |V.PGP 2.7: 512/E12FCD 1994/03/17 > " " " |P. O. Box 15432 | finger for full PGP key > " " /\ " |Honolulu, HI 96830 |====================================> \" "/ \" |Serendipitous Solutions| Also NetSurfer@sersol.com > >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
How the hell did the poster "customize" his address to ...ummm...fit the post???
not hard at all...by telnetting in to port 25 of a system on the net, you can talk directly to that systems sendmail...mail is passed in ascii format...few systems require a HELO (identifying the system telnetting in)...then you simply type in the mail headers manually...combine this with the fact that some systems let you post to usenet by email, and you can do just about anything and be untraceable (i think, anyone know for sure?)...
Well you can do it this way by using a mail to news gateway, as for tracibility, this is quite tracible. Remember all you have to do is have a log of all incoming telnet sessions and a log at the home machine of all out going telnet sessions and you're easily paired up with it. That's one of the ways, some stupid fool got caught mailing a death threat to the president using forged mail from 'never.gonna.catch.me.org' Ben.
That's one of the ways, some stupid fool got caught mailing a death threat to the president using forged mail from 'never.gonna.catch.me.org'
Another way that people often let themselves be caught is that they inevitably send a test message to themselves right before the forged message in question. This shows up clearly in the sending system's sendmail logs. It's a point to consider with remailer chains too, if you don't trust the last machine on the chain. Phil
participants (4)
-
NetSurfer -
nobody@shell.portal.com -
Phil Karn -
Subversive Citizen Unit