__________ __ ________________ / _____/ \ / \/ _ \__ ___/___ _____ _____ \_____ \\ \/\/ / /_\ \| |_/ __ \\__ \ / \ / \\ / | \ |\ ___/ / __ \| Y Y \ /_______ / \__/\ /\____|__ /____| \___ >____ /__|_| / \/ \/ \/ \/ \/ \/ [ 1998 - 2010 - Hacking, Phreaking & Anarchy in the UK ] January 12 2010 . Author -=The Firestarter=- ---------------------------------------------------------- [ anonymous mail ] ---------------------------------------------------------- [ 'anonymous mail' ] A little trick i discovered (tho i'm sure i'm not the first person too) while messing about with proxy servers. Specifically SOCKS servers. Connecting to them with a mail client that supports socks, then connecting to the networks email server (which would otherwise not relay mail). The whole idea of its so simple, it wouldn't suprise me if thats just how 90% of the spam on the net comes from. Basically, once you've connected to the SOCKS server, your sort-of part of the network on which it is running. So you access the mail server using the proxy. the mail server will lookup the IP (which will be that of the socks server), realise its on its own network and connect to it over the lan (well, it depends a lot on network setup, but the theorys all the same). Now, if your lucky the mail server will only allow email to be relayed from authenticated clients and people using the network that the mail server is running on. Since your part of the network (via the socks server), your free to send out mail with only the trace back to the socks server (which if your lucky will be an internal IP address, making things a little more difficult to track). There of course are risks to pulling off this little stunt, but if you can manage it you can probably figure out what they are. [ Fate ] A top notch article we had detailing the downfall of an ISP was lost by simple error of stupidity on the delete key. this is good in a sense as it detailed the cyber-crime in a bit too much detail. better luck next time.