Latest News:

 

Cracking Tutorial

-A cracker works by repeatingly sending passwords to where passwords

are prompted. (login mechanisms)


-Crackers require password lists (aka dictionay files), which is tried

sent to the target (server, username prompt)


-All a cracker does, is trying different combinations of words and

numbers,until the correct password to the username is entered.

(Crackers work on the possibility that one of the passwords they

have in the password list is valid for the usernames they are

trying to get.)





2.) Basics you need to know...


-Cracker's use either servers or proxies in cracking. For those who do not know

what a proxy is, an ip adress is a simple way to describe it...


-A Cracker goes into a server's login mechanism to attempt to login and crack

the designated screen name.


-Memory: occionally you will find a cracker w/ this time saving option "☻" Very

few crackers have a memory option. It saves where you last were, instead of start-

ing from the beginning of the password list.


-Alerts: when a name has been cracked, the cracker has away of alerting you, more common

you will get sound alert. In other cases an Alert Window will pop up,



-Password Options: This most often has'd to do w/ the caps in a password. p/w options

can change the passwords to "ALL CAPS" or First "Letter Caps"



-Sockets - A cracker's speed is defined by it's # of sockets. From a begginer's

stand point, you might think that setting your cracker for it's max # of sockets

will allow you to crack screen names faster, but in retrospect, you will be cracking

less because it will be skipping.


- Auto save is when you crack something it out saves it so if a problem

occurr and it closes you have what you cracked saved.



-Alot of servers ban your ip if it is displayed w/ alot of failed attempts

Of logging in. THIS IS WHY, you use multiple proxies. Proxies can get banned,

but you can always find more of them.


-The name of the game that most people crack yahoo screen names is known as

"brute forcing" Brute Forcing is the process of trying various passwords from -regsd- a dictionary file (automatically), for a given username, until the password ''''''' matches the username.





-In cracking, people that crack names look for usernames that the service no longer

allows them to make, these discontinued names are called illegals (a.k.a Rares).

+You will also here about a group of cracked names called originals, example of this

Would be "woody, farmer, warrior and potenant (you get the picture hence "original")



-On Id's, people that you see that appear to have spaces do not. Actually the name would

have the addition charactor ( + ), For example Im Fuct would actually be Im+Fuct



3.) Tools you need for cracking...




-You need a cracker of course, I recommend crackers that use proxies.


-Don't bother going on some cracking website and downloading proxies from their

text files. Most likely the they have proxies are no longer valid or leeched.

(banned on most servers^)


-To find Proxies, you need two kinds of proxy scanners, one scanner to find proxies,

and a scanner to check if those proxies are valid. (Writer's Note- Fubu`s Bouncer

uses Proxinator and the scanner in Firewater Evolution to scan for proxies)



-For Crackers that use servers, you would get a server scanner, you can find one in

the cracking section of most yahoo cracking websites. Remember, if the cracker only

uses servers w/out proxies, your ip address will get banned from those servers.


-These are not tools, but are required regardless. You need namelists aka dictionary files,

and password lists, the password lists you choose are important on cracking specific names.


-If you are going to be cracking, you need password changers. You don't want to lose something

tha'ya cracked right? I shouldn't even be telling you that...



-You probably were curious about cracking because you wanted to own an illegal id,

It will be hell to find illegals w/ just a cracker alone, you need a name scanner.

the good name scanners will also search for that name with +'s _'s at the beginning

or end. Periods are also an illegal charactor, and alot of id scanners will include

_'s, +'s, .'s,


4.)*How to Crack*


This is the part that you have been waiting for, but will be very brief...



-Select a cracker , finding the latest crackers

may depend on you checking new anti-yahoo websites through their affiliates and topsites. yahell-confidential is a fine example)


-Load a namelist (the names that you want to crack, I recommend a large list)



-Load a pw (password) list, you should have different kinds of password lists,

such as common password lists, specified password lists (ex. would have passwords like

pooh poohbear winnie piglet tigger, if they are cracking a winnie the pooh name)


-Once you have scanned for valid working proxies or servers, load them into the cracker

(NOTE- THESE MUST BE VALID OF THE CRACKER WILL NOT WORK!!!!!)


-Set options, # of sockets and name/password priorities.


[I bet you got into cracking so you could steal some yahoo screen names, but why settle

[that when you could go to your favorite sites, figure out what there servers are, and

[and unleash dictionary definions as armageadon on the screen names you desire........

[http://www.hackology.com/programs/mbhttpbf/ginfo.shtml Try Munga Bunga for cracking anew!



5.) How to find out if your cracker works...



-Make sure that the cracker is the latest version available, make sure it is still

working check the date of when it was submitted, if it was submitted 9/11/03, that's

most likely invalid!



-To make sure it still works, load up the correct proxies and servers, and add your

names and passwords to the name and passwords list, if it cracks one of your names,

Then it works!





This is Cracking Tutorial for yahell confidential. This goes over the things that I should've

covered in my first tutorial. If there is something that you would like me to add, and god plz

share, I will add it in my next tutorial update, and I will add you in the credits. Things that

I didn't really go over in this tutorial was the discussion of NCC and MSG server crackers, nor

have I gone over the various cracking tricks.
_________________________________________
Thanks and Regards;
s.-.a.-.n.-.j.-.a.



Please comment if you like this post!
An AwaazBandh Presentation!

Digg It! Add to del.icio.us Stumble This

Posted in Labels: |

0 comments: