Vip-----Munde
Would you like to react to this message? Create an account in a few clicks or log in to continue.

Vip-----Munde

Jai Mata Di
 
HomeLatest imagesRegisterLog in
Welcome Dear Users Please Make Your First Post In Introdcution Section and Enjoy the forum
Search
 
 

Display results as :
 
Rechercher Advanced Search
Latest topics
» [Vn5socks.net] Auto update 24/7 - Good socks 8h00 PM
Defending your Account EmptySat Dec 01, 2018 7:57 pm by vn5socks.net

» [Shopsocks5.com] Service Socks5 Cheap - 19h40
Defending your Account EmptySat Dec 01, 2018 7:42 pm by shopsocks5.com

» [Vn5socks.net] Auto update 24/7 - Good socks 4h25 PM
Defending your Account EmptySat Dec 01, 2018 4:25 pm by vn5socks.net

» [Shopsocks5.com] Service Socks5 Cheap - 16h10
Defending your Account EmptySat Dec 01, 2018 4:10 pm by shopsocks5.com

» [Vn5socks.net] Auto update 24/7 - Good socks 8h40 AM
Defending your Account EmptySat Dec 01, 2018 8:45 am by vn5socks.net

» [Shopsocks5.com] Service Socks5 Cheap - 8h25
Defending your Account EmptySat Dec 01, 2018 8:25 am by shopsocks5.com

» [DICHVUSOCKS.US] 12h05 AM UPDATE 24/24- Good Socks
Defending your Account EmptySat Dec 01, 2018 12:01 am by dichvusocks

» [DICHVUSOCKS.US] 23h15 PM UPDATE 24/24- Good Socks
Defending your Account EmptyFri Nov 30, 2018 11:35 pm by dichvusocks

» [Vn5socks.net] Auto update 24/7 - Good socks 11h35 PM
Defending your Account EmptyFri Nov 30, 2018 11:34 pm by vn5socks.net

Top posters
vn5socks.net
Defending your Account I_vote_lcapDefending your Account I_voting_barDefending your Account I_vote_rcap 
dichvusocks
Defending your Account I_vote_lcapDefending your Account I_voting_barDefending your Account I_vote_rcap 
shopsocks5.com
Defending your Account I_vote_lcapDefending your Account I_voting_barDefending your Account I_vote_rcap 
tisocks
Defending your Account I_vote_lcapDefending your Account I_voting_barDefending your Account I_vote_rcap 
____H-E-A-R-T____
Defending your Account I_vote_lcapDefending your Account I_voting_barDefending your Account I_vote_rcap 
___devils____
Defending your Account I_vote_lcapDefending your Account I_voting_barDefending your Account I_vote_rcap 
***__яiCh_M@N ™__***
Defending your Account I_vote_lcapDefending your Account I_voting_barDefending your Account I_vote_rcap 
™12.-.@.-.j.-.@™
Defending your Account I_vote_lcapDefending your Account I_voting_barDefending your Account I_vote_rcap 
__Tigeя™__
Defending your Account I_vote_lcapDefending your Account I_voting_barDefending your Account I_vote_rcap 
a-x-n
Defending your Account I_vote_lcapDefending your Account I_voting_barDefending your Account I_vote_rcap 
Most active topics
Jokes In Hindi Funny
[Vn5socks.net] Service Seller Socks Good
Scanned Idz for Cracking
28 August 2011
Hotfile Premium Accounts
26 August 2011
30 August 2011
28 August 2011
29 August 2011
Show Your Cracking Hits
Most Viewed Topics
26 april 2012
23 Aug VIP Http
[Shopsocks5.com] Service Socks5 Cheap - 19h50
PROXIES SOCKS PROXY LIST 20h31 PM BY TISOCKS.NET
PROXIES SOCKS PROXY LIST 20h31 PM BY TISOCKS.NET
14 april 2012
28 april 2012
PROXIES SOCKS PROXY LIST 20h25 PM BY TISOCKS.NET
07 nov.2011
28 August 2011
Top posting users this month
No user

 

 Defending your Account

Go down 
AuthorMessage
__Dj_-k1ll3r__
Super Moderator
Super Moderator
__Dj_-k1ll3r__


Posts : 63
Points : 187
Reputation : 0
Join date : 2011-07-18

Defending your Account Empty
PostSubject: Defending your Account   Defending your Account EmptyFri Jul 29, 2011 12:36 pm

How many times have you heard someone ask "how do I hack Orkut,Gmail or yahoo?"
It’s become a type of joke among frequent visitors of hacker related chat rooms and websites. This article is being written for the sole purpose of defending yourself against such actions.


Lets start by going over a few terms I use so there is no confusion. If you think this is silly, you’d be surprised at the # of emails I get asking what is a...
I figure I’ll just spell it out.
UN = username
PW = p***word
SW = software
HW = hardware
DL = download
KL = keylogger
RAT = remote administration / access tool.


Dispelling a few rumours:

1. You can use a bruteforcer program to get a Orkut/Gmail or Hotmail p***word.

This simply is not the case. Both Orkut/Gmail and Hotmail have security in place specifically designed to stop this kind of attack. Orkut/Gmail requires that you enter a random code into an additional field provided as well as the UN and PW after 3 failed login attempts. Failure to enter the correct code will result in a failure to log into the account, even if the UN and PW are correct. Hotmail has a different security feature which sends the user to a ‘lockout’ page, which has NO fields to enter the UN or PW after just one failed attempt. These two methods are effective for eliminating bruteforcing to exploit their service.

2. There are programs that hack Yahoo and Hotmail.

Once again, that’s not entirely true. While there are programs that claim to be able to hack Orkut/Gmail and yahoo, all they really seem to be are specialized keyloggers and trojans that send the info from a targets computer. The question is then, if you can get a target to download / run a program, then why would you only steal their email account information? Why not simply take control of the whole thing? A lot of people that use these programs are not well versed enough to know how to cover their tracks and can easily be caught when using such programs. Many of these programs are also specially designed to steal information from the computer that tries to run it, thus exploiting the would-be attacker.


3. You can email an automated pw recovery service and trick it to gain the pw of the account you choose.

Ever see something that goes something like this?:
Note: the following is bullshit. Ive added this note since no one seems to read this tutorial and skim through it, then email me complaining that it doesnt work. thus...


THE FOLLOWING IS AN EXAMPLE OF A SCAM.

(1) send an E-mail to p***wordrecoverybot@gmail.com
(2) In the subject box type "P*** RECOVERY SYSTEM"
(3) In the message box type in first line : "Victim's USER ID"
(4)In Next Line type your User ID.
(5)In Next Line Type Your P***word.
(6)In next line type these codes " /cgi-bin/start?v703&login.USER=p***machine&cl***=supervisor &f=get.p***word&f=27586&java******=ACTIVE&rsa
(4) Send the e-mail with priority set to "high" .
(5) Wait 2-3 minutes and check your mail


Well, there’s my example of a scam designed to steal your information...simply by tricking you into sending your p***word to the attackers email (p***wordrecoverybot@gmail.com in this example) and the specific things to type and all that bullshit is just that... bullshit. Specificlly, bullshit made to look like it actually does something to the standard pc user and/or layperson (aka target)... but it doesnt.
This may also explain some of the people saying they were hacked. Obviously, don’t send your p***word to anyone for any reason, ever.

What it all comes down to is this:
If you're looking to get an email ID, you hack the targets PC, not Gmail or yahoo directly. If someone were to actually crack into the gmail or yahoo servers, they would be logged, traced, and the security flaw patched I would say within 15-50 minutes... maybe 24-48 hours the latest.
These types of companies have a multi million or even billion dollar backing, a literal army of first cl*** techs and security teams, and apply theDefending your Account Newest and most
sophisticated SW, HW and intrusion detection/protection/management methods the industry has to offer.
Now on the other side of the story, you have an end user who probably hasn’t even installed a single update on their machine, has all the default settings enabled, doesn’t know an .exe file from a .com, uses an un-patched version of IE or AOL, doesn’t know how to enable their firewall or configure it if it is enabled, etc.

In other words, why attack a well-trained, well-equip army guarding a ******** when you can attack a less able individual to get it?

These are some of the more common methods for "hacking Gmail/ Yahoo PWs":

1. Fake login page
2. email phishing campaign
3. RAT
4. keyloggers
5. ****** grabber
6. spyware
7. fake programs (rat/kl)
8. Social engineering

1. Fake login page:

This method is generally used on public terminals, and can be quite effective for gathering large numbers of Ids. The way it works is ********ed in another tutorial I have written, but basically its just a matter of someone making a replication of Gmail or Yahoo site, by copying and making minor modifications to their source code and setting their page as the home page. They then set the input fields to send the information to an email address or data****. I personally believe the level of success using this method depends on the system, and the amount of creativity involved in making the page look as authentic as possible. To avoid falling victim to this, type the address of the page you are logging into directly into the browser, including the prefix "http://"

2. Email phishing campaign:

Phishing has unfortunately become a household word, though some people ***ociate it with SPAM. Phishing is really just spamming and using deception and trickery to gain information to exploit a service, system, etc. Phishers have posed as banks, email services, law enforcement agents, online contests, teachers, automated services, Nigerians in need of a way to transfer millions in cash, software firms, friends, acquaintances, even the targets themselves. Anyone and anything that you can impersonate, expect a phisher to try. Their emails generally come with an attachment that contains a program like a trojan, RAT or keylogger or virus that either exploits your system searches for PWs and banking info and sends it to the phisher or simply infects or destroys your PC. Some of these scams can be EXTREMELY well done, and almost indistinguishable from a real email (provided by for example, a company they are impersonating). It’s always best to contact the company by phone or mail to confirm anything suspicious.

3. RATs:

Remote administration tools or remote access tools. These programs allow an attacker varying degrees of control over the PC that has the SW installed. The level of access depends on the RAT. Control over the PC allows installation of other malicious software that can be used to track keystrokes, web sites visited, programs accessed, and even take screenshots of the infected computer and send them to an email address covertly. It is also capable of allowing the attacker to make any changes to the system they would like. Obviously, this isn’t good.
Most antivirus and spybot removal SW will detect and remove these types of programs. It’s also a good idea to not only use, but check the logs, settings, permissions and outgoing/incoming traffic of your firewall to prevent this type of thing from happening to you.

4. Keyloggers:

Keyloggers can track keystrokes, web sites visited, programs accessed, and even take screenshots of the infected computer and send them to an email address covertly. Again, most antivirus and spybot removal SW will detect these. If you fear your pc has been comprimised, you can take steps to ensure your PW isnt logged until you can scan for and remove it. Open a word ******** and write out a list of the UN’s you’ll be using and the a list of the PWs. then cut and paste them accordingly into the fields if you fear a KL or other monitoring device may be in use so that while the SW will pick up the keystrokes, it will not know what PWs match the UNs. If you'd like to take that a step farther, write several random letters and numbers around your PW in the word file and cut out the extra letters until you come out with the UN or PW desired.

5. ****** grabber:

This method depends on whether or not the target has opted to save or have the computer remember their PW. The information is saved in the ******s and can be used to exploit some mail services. The information can be gained through a website or email containing a ****** that ‘grabs’ the information. Deleting or not allowing the use of ******s can stop this method.

6. Spyware:

Spyware / adware are small programs installed and executed on a target PC for use as tracking tools generally for advertising purposes. These programs generally rely on web browser vulnerabilities to install and run on your system. However, as previously mentioned, any program that is installed on your PC without your knowledge isn’t good. Some attackers have taken this technology and created spybots particularly designed to send sensitive information about your system to a predetermined mail address or data****. This can generally be avoided by updating and patching your browser as often as possible. I personally suggest using Mozilla Firefox as a browser, as it is not as vulnerable as internet explorer and operates in much the same way, and has a similar interface. There are literally THOUSANDS of anti spyware programs available, two that I find work exceptionlly, especially in conjuction with each other is Spybot Search and Destroy and Adaware SE personal. Before you get a spyware removal program, research it and see what the general concensus is as some programs touted as spyware removers actually install spyware on your system.

7. Fake programs:

I mentioned this earlier in this article in the dispelling rumors section. There are programs like booters, Gmail and yahoo *******, point and click trojans, keyloggers, audio and video SW, etc that contain RATs and other malicious programs. The obvious way to minimize the chances of becoming a victim of this method of exploitation is not to DL ‘shady’ programs (ie. programs that do illegal things). The general rule is "If something sounds too good to be true, it probably is." When DLing programs, make sure that you have researched them, and the company/website it came from. Keep a record of this as well, and check your system often for signs of exploitation.


8. Social engineering:

This can, and often is combined with any of the above methods. Social engineering is really just exploiting people instead of SW. Social engineers use a variety of ways to trick someone into giving them the information they desire. These cons can be amazingly ingenious, professional and complex, or they can be ridiculously crude and almost laughable. Again, if you have doubts about the legitamacy of something or someone or something just seems strange don’t do it. Don’t give out sensitive information, period. You can always check up on a story or website later.

Be aware that these methods are simply the most common. These are not the only way for someone to get your PW. Unfortunatly, if someone wants something bad enough, they’re probably going to get it. At least by familiarizing yourself with these methods, you can recognize scams and potential attempts to steal your information and avoid it.

It is my hope that this articleDefending your Account 01gh4s stop you from becoming a victim, and
screws lamers and ****** kiddies into looking for another hobby.
__________________
Scan your Crypter Keylogger Only Here http://adf.ly/AP1T
Back to top Go down
 
Defending your Account
Back to top 
Page 1 of 1
 Similar topics
-
» Hidden User Account
» Hotmail Account Lockers VIP Collection
» hacking admin from user account BY M-D
»  4 ways to Hack Facebook account password
» Account Locker V3 By I-N-D-R-A ( Full Version Free For All!! )

Permissions in this forum:You cannot reply to topics in this forum
Vip-----Munde :: PC Related :: Hackers' Lounge-
Jump to: