Text/SMS Spoofs are sent by either e-mail or through a web
site. The sender inputs your number and then inputs the number or name
they want you to see on the caller ID. They then input their message
and send.
See Text/SMS Spoofing for more in depth data.
Phone Spoofs are sent through a phone or a combination of a
web site and a phone. Typically either involves a third party company
that acts as an intermediary. The sender initiates a call by either
visiting the third party company’s web site or calling their specified
call in number. The sender then inputs the caller ID information they
want displayed and they are connected. The third party company does all
the work and charges by the minute. These third party companies will
even change the sender’s voice and record the call for the spoofer.
See Caller ID Spoofing for more in depth data.
URL Spoofing – When the address (A.K.A., domain name or URL)
displayed in the address ‘location’ bar at the top of a browser is not
really the web page being displayed it has been spoofed. For example
the user may see www.citibank.com in the address location bar but really
be on the web page www.iamgoingtorobyou.com
Web Spoofing is when the spoofer puts a computer between the
internet user’s machine and the entire internet thereby intercepting
everything the internet user does.
To accomplish this a spoofer must first somehow get an internet user
to visit the spoofers ‘trap’ web page. The spoofer could get an
internet surfer to the ‘trap’ web page through a variety of tricks and
techniques including but not limited to:
- a link in a spam e-mail
- through a hyper-link on a non-trap web page
- even a link the internet surfer clicks on from a search engine.
Once the internet surfer visits the spoofers ‘trap’ web page every
web page that the internet user visits thereafter is served from
spoofers computer. The internet user sees the actual web pages that
they are visiting but the spoofer is acting as a malicious intermediary
ISP, spying on everything the internet user sees and types. This means
that the spoofer can intercept all of the internet users ID’s and
passwords, credit card information, and anything else the web surfer
types in to web pages they visit.
e-mail Spoofing is when a spoofer falsifies the information
about whom an e-mail is from. Most spam (unsolicited e-mail) uses
e-mail spoofing with the primary intent to trick the recipient into
viewing the e-mail. A good example is the thousands of e-mail claiming
to be from eBay that are really spam.
The spammer usually does not spoof to hide their location. In fact the
spammer will go to much greater lengths to hide their actual location
using a variety of techniques- so that they can not be found.
See e-mail Spoofing for more in depth data
IP Spoofing – (Internet Protocol Spoofing) – Data sent over
the internet (such as an e-mail) is broken up and sent in small pieces
of information called packets. These packets once received are
reassembled by the recipient. Each packet contains information about
who the packet is from and who the packet is to, among other data.
Spoofers can falsify who the packet is from to trick the recipient.
This type of spoofing is often used to gain access to machines which use
IP authentication to verify identity.
See IP Spoofing for more in depth data.
YouSpoof.info does not endorse spoofing, spamming, phishing,
pretexting or any illegal activities. The information contained on
YouSpoof.info is purely for informational purposes and not to be used
for any illegal activity.
Please do not SPOOF for illegal purposes and take serious note of the following:
Legally the Junk Fax Law covers Text to Text messages and fines can top out at $500.00 per spoofed message.
The CAN-SPAM act covers Internet (web and e-mail based) to Text
messages and fines can top out at $50,000.00 per spoofed message.
voice mail is not “pass protected” a Spoofer can access your Voice mail
and even change the greeting incoming callers hear.