SEARCH

x

Sunday 12 August 2012

Email account/PC hacking tutorial in short by DigiLocker64


Hello everyone,
This tutorial is written by a small known learner(hacker) DigiLocker32 (me).
Let me tell you guys that i m a 16 year old guy so, if you find any mistake plz report to me asap.
Lets start,Today hacking an email account/PC is like an art, sometimes/some hacks are very easy but not so strong and some needs brains, social engineering and are very strong.
Lets go to the easier one to the toughest.

Before starting let me tell you that there is no such software made ever that can hack an email account directly and if you find such thing anywhere then that is totally fake or maybe a kit/software to hack into your PC.

Lets Start!

Keylogger : Its nothing but just a small software installed in your pc i would recommend "Ardamax Keylogger" which can record keystrokes and screenshots and can be seen by you at anytime.

a) Software Based Keylogger : Here the software is programmed in such a way that it records all the keystrokes, screenshot, passwords etc. There are two types of key-logger

b) Normal Keylogger : This is the ordinary keylogger.it also records keystrokes, screenshots but it has a limitation that you can’t install it without having physical access to victim’s pc.

c) Remote Keylogger : These are local software keyloggers with an added feature that allows access to the locally recorded data from a remote location. Remote communication may be achieved using one of these methods:Data is uploaded to a website, database or an FTP server.Data is periodically emailed to a pre-defined email addressThe software enables a remote login to the local machine from the Internet or the local network, for data logs stored on the target machine to be accessed.

d) Hardware-based key-loggers : Hardware-based keyloggers do not depend upon any software being installed as they exist at a hardware level in a computer system.For this, the hacker has to connect a hardware device on your PC. This type of keylogging usually seen at Net Cafe. It looks like a Pen-Drive, so be careful.

* Remote Server : Here we just have to create a server file which will be connected to our gmail account. You just have to send the file to victim and make sure that he install it. Now whenever he types anything youwill recieve it as an email.

* RAT (Remote Administration Tool) : First of all let me tell you RAT functions same like remote keylogger but here the difference is we will be able to control his PC just like the software known as "Team Viewer". I would recommend you to download the software"PRO RAT" for this. Prorat a famous trojan for hacking system, facebook, gmail, yahoo, twitter and other accounts. You can download it easily by searching on google.

* Social Engineering : If you use very weak passwords your family member or friends can guess your password easily. While you are login in, they might have seen some of the keys you are pressing while typing password & then they can make a guess of whole password. The hacker may ask you for your password by any manner.

* Phishing : Here we have to use our brain and some social engineering its nothing but forcing the victim to do what you want/need. Here what we do is create an fake login page of the website e.g. Facebook. We just have to make a fake login page which looks like facebook login page and force the victim to enter their email and password there, and as he enters you will recieve his id andpassword eg- Instead of “www.facebook.com/login.php” it will look like “www.abc.com/a/b/c/login.php”. Hacker may send his own URL by shortening it & it’ll look like “www.goo.gl/an67h “ . but after you open this, it’ll expand and you can see it’s real URL. For tutorial on phishing visit my blog and search phishing here www.digilocker32.blogspot.in

* Network Sniffing : A hacker can sniff the network using special tools such as "CAIN & ABEL" can decrypt your email password. This requires a very special hacking knowledge.

* Metaspoilt : The features of Metasploit are mutch like a rat. Once you get into someone's computer, you can see their screen, controll their mouse, see what they type, see them, etc. For this you just need to have victims IP address now the things you need is First you need to download Metasploit. PostgrSQL for your database. You can get everything about metasploit at my blog search "metasploit" here www.digilocker32.blogspot.in

* Tabnapping through backtrack (my favourite one) : In this what we need is 
1. Backtrack 5 R2 
2. Internet connection 
3. A brain 
We are going to use backtrack and social engineering kit which is inbuild in it.
So lets start,
First open the social engineering kit using this command in cd /pentest/exploits/set and then press enter and then type ./set and hit enter.
Now type 1 to select Social-Engineering Attacks and hit enter.
Now type 2 to select Website Attack Vectors and hit enter.
Now type 4 to select Tabnabbing Attack Method and hit enter.
Now type 2 to select Site Cloner and hit enter.
Enter the URL of the site you want to clone. For example gmail, so i will enter this http://www.gmail.com and hit enter. SET will clone up the web site. And press return to continue. It will start cloning the website.
Now send ur ip address as a link to victim.
Now when victim click on it they get the fake page and when he fill the details he will got hacked.

NOTE : All the sources in the tutorial can be easily found on google.
Here we are done with this tutorial if you need to know anything more about this tutorial and any questions if you have then inbox me.

This tutorial was just for educational purpose, I would recommend you not to try this anywhere, may lead to heavy penalty.

Thank You,
DigiLocker64



No comments:

Post a Comment