Pages

Friday, January 11, 2008

YAHOO # PASSWORD #CRACKING # METHODS #

YAHOO # PASSWORD #CRACKING # METHODS #

Methods of getting yahoo passwordsI will explain in this tutorial how to obtain in difrentways yahoo passwords so that any N00B can understand and doit.
It actualy isen't that hard the problem is thet with thepassing of years yahoo security has been getting better andbeter an most proggyes don't work anymore now I willpresent to u the most efective reliable and easy to domethods.
After that I will also Informe you on how toprotect your self of thees dangers that go around teinternet.

METHOD 1------BRUTE FORCING------

This is by far the most used method .
You can find crackerseverywhere to download .On[hide]www.hackerspk.com [/hide]
there are a lotof good cracked downloads.The one for which i sugestR-G-Kracka it's easy to use and works.
This is the mostsawed for method but is good for 2 things cracking bootsand when u realy want a password and will spend some timecracking testing and working.For this You have to get A cracker A password list and insome cases a proxy list but I sugest u try a non proxycracker if it's ur first time.
This is a basic method and I'm sure that everyone will getit the first time aldough results depend on your passwordlist.PROTECTION It's simple get a very long password with asciand numbers the most hard and long password that a bruteforcer will have trouble cracking and getting to is thelast of all asci letters and numbers the last password anormal brute forcew of let's say 10 chars will be"zzzzzzzz9!" thIs password will be the last one it will tryto crack.

contd................contdddddddddddd

METHOD 2------TROJAN PASSWORD STEALER------

This is one of the most effective methods of obtainingpasswords at this time.
U get a programme named Y! Jacked/mps1.5se/sub7
none of it's many varyations from [hide]www.cyberpunkz.com or www.hackerspk.com[/hide]there aremany trojans n stealers.
With this you have to take the main program put it in afolder and generate a trojan that you send via atachment tothe victim's mail box.
When that person opens it u will havehi's password.This is a easy to use program just take caretaht most antivirusez see it as a virus and u shoulden'tget alarmed by that.It has a lot of options that u willunderstand surely if u know english.
PROTECTION It's the easyest way to protect ur self don'topen atachments from anybody I can send a mail with anatachment from any mail I want for example It's not smart
to open any atachment without a good antivirus.

METHOD 3------THE FAKE LOGIN------

This is a modified login page for yahoo.
It's code has beenaltered .Instead of sending the password and the user to ayahoo server for loging in it sends them to a yahoo serverthat sends them in a mail account.
Get one of thees from cretain people lool.It's hard to spot people u after u make a page with this uhave to send the link to some1 and he has to sign in fromthere.
PROTECTION Don't sign in yahoo from pages like[hide]"www.infernal.isking.com/login.yahoo/script"[/hide]
This is probably a fake login.Try to open one of thees pages and check out the sourcecode u can determine what it will do from there.

1 comment:

Jagdish Patel said...

nice buddy, keeep it up...