HOW TO HACK HOTMAIL/GMAIL/YAHOO/FACEBOOK ID
I’m merely disappointed by the number of technically
illiterate people around the world. The most popular question in any
hacking related site is “How to hack e-mail” its not tolerated in any
security/hacking related forum and if asked you can expect to get a rant
from people. the reason is simple because there are NO ways of hacking a
e-mail address by easy means and the people who know this fact often
get very annoyed when most people don’t understand WHY its NOT POSSIBLE !
The hacking of a e-mail is possible when a person
who owns the account gets hacked. the other way is to hack them directly
from the e-mail servers which is most unlikely because these sites use
sophisticated Intrusion Detection and highly skilled consultants who are
up to date with exploits and patch’s. unless you are a real
professional hacker its highly unlikely you will ever break into a
e-mail server.
People MUST understand that there are NO
PROGRAMS/SOFTWARE’S that can hack a e-mail password when you enter an
e-mail address. to understand this
better let me explain you how e-mail works
Lets say you have a gmail account
When you enter your username and password and hit
login what happens is your outgoing e-mail server encrypts the login
information and sends over the network to its destination which is a
gmail server which can ONLY decrypt the encrypted credentials then these
were checked against its database and if they match it will re direct
you to your mail inbox. to authenticate you with the gmail server, it
will send you a cookie ( a text file ) with a session ID to your browser
confirming that you are authenticated so the gmail server.
So there was a time when e-mail servers gave the
option to NOT to use SSL cause it slows down the e-mail. because of the
time it takes to encrypt. it was a “happy time” for the hackers who
simply used a wifi hotspot to sniff session ID and break into emails !!!
why ? because If anyone sniffs your session ID he can use it to login
into you mail WITHOUT the password because the session ID is the proof
of authentication as I mentioned earlier ^ but with almost all the
e-mail servers NOW use a SSL encryption and the Session ID is also
encrypted so by sniffing its NOT possible to decrypt the ID !
So there goes Packet Sniffing
You may ask so what ? why the encryption cannot be cracked ?
Because The encryption uses Hypertext Transfer
Protocol over Secure Socket Layer and public/Private key encryptions
technique which is almost impossible to crack. Do some Research on these
terms and you will know why its not possible to crack/
If you’re curious and patient enough read this else Skip
http://www.cohn-family.com/encryption.htm
So now the next possible way is to somehow hack into
the gmail servers and pull the password hash’s and then crack them.
well, sadly not many people have succeeded doing it because its highly
impossible and way too risky
Now after reading all this you might have a slight
idea why I ask people who claim “they can hack any e-mail” to prove it
!! so if you can make a program that can somehow bypass all the security
and bring the password from the gmail server then you deserve a noble
prize !!!
<But I must tell you that professional hackers do
have few techniques to override these terms I mentioned in certain
cases….>
NOW ASK ME HOW TO HACK A E-MAIL ?
Ok you clearly know its almost impossible but the
good news is that its possible to hack a individuals computer or a web
server. most people lack of common sense and so many people have NO
technical knowledge whatsoever. so by hacking them its possible to steal
their passwords.
Because we can’t hack the password from the servers but we can hack it from the people who use it..
There are so many ways.. here are some of the methods,
1. Fake Login page – Fake page also
known as phishing. This process involves creating a fake login page of a
certain e-mail and tweaking the password authentication process so when
the user inserts login details it will be sent to the hacker. This is
the easiest way to hack when the victim has no technical knowledge.
2. Social Engineering – Humans have
certain weaknesses and this process involves exploiting someone’s
weakness to retrieve a credential such as a password. for an e.g: There
are many incidents in the past like once when a hacker phoned a employee
of a company (victim) and identified himself as the Technical Engineer
of that company and instructed the employee (victim) to follow a set of
FAKE system error checking and eventually received his login password
from him by simply convincing him to reveal them. its just simple as
that/ it does takes lot of confidence and skill.
3. Keylogger – Its an application
which runs hidden from a user in the background and logs/records all the
keystrokes of a user. when a user types something it will be recorded
and saved. when the system goes online the recorded details will be sent
to the hacker. which can contain a e-mail login detail. the keyloggers
are outdated and most of them are detected by anti-virus programs. but
when used in a LAN network or when the hacker has physical access to a
system it proves to be effective. so if your girlfriend/boyfriend is
cheating on you this is the way to go.. but I still think smart people
don’t keep “cheating related e-mails in their inbox” he he
The downfall of keyloggers are that not many
keyloggers can be deployed remotely and they are often picked by
anti-virus programs (which can be avoided by using code obfuscation or
packing/crypting, changing Entry point..but its more complex)
Another downfall of keylogger is that most of them
don’t use any encryption and the data is sent as it is, with a skilled
reverse engineer its possible to track down the hacker by breaking the
file and analysing the code.
4. Trojans – Programs which are
often known as backdoors. these programs are similar to keyloggers but
they can execute certain commands sent by the hacker. most Trojans have a
built in password stealer which is an application that can steal stored
browser passwords. also in addition they have far more sophisticated
functions such as webcam capture (YES the hacker can see you when you
pick your nose) ability to browse/download/edit your files and folders,
audio recording, etc.. different Trojans have different functions. All
hacker has to do is create a server and send it to the victim and once
the victim opens the file it will drop into the victims system and
connect to hackers client. now he can issue commands to his server which
is in the victims computer and manipulate it whatever the way he likes.
Trojans are very easy to use and most of them use
encryption and security evasion techniques and there are TONS of
tutorials all over internet if anyone interested in using them.
I hope I have covered enough information. so next
time when you see someone asking “How to hack email” Please point it to
this thread. so he/she don’t waste his/her time and money.
My advise is if you have a personal issue such as
cheating/breaking up I encourage you to sort them by other means. or
maybe Go see a doctor. if she dumped you… MOVE ON !
No comments:
Post a Comment