Various Types of Email Hacking
Now, we will show you and teach you how many types of Email hacking are there because everybody wants to get the secrets of friends, girlfriends or partner and for this you search on Google and find out the ways of account hacking , facebook hacking and we have seen that’s some of the site even provide software for hacking and cracking the passwords of Email. First of all Note this there is no Software in this world that can hack email passwords by entering Email , So Here are some ways of Hacking Email Accounts :-
1.Phishing
You will think that what is Phishing? So don’t worry we will tell you. Phishing is known as to make fool the victim by showing him the fake page that was looking like the original web page. Have you ever seen that Fisherman who catch the Fish by putting some food on their stick and catch the fish. This is the same type we use in phishing, Hacker send a phishing page to victim and victim enters his/her information on that page easily because that was looking like the original one.
In this one Social Engineering will also work because if we want to hack email account of a friend or girlfriend so we will easily know that what victim’s like/dislikes if victim like wallpapers so we will send an anonymous email that there are 1000 of hd wallpapers for you and if our friend like pc games so we send him a link to provide information of his/her email accounts by sending him Gmail phishing page and get 200 games free so victim will fill his/her information on that Gmail accountlogin page and IF YOU WANT TO SEE SOME PHISHING VIDEOS SO GOHERE AND WANT TO SEND ANONYMOUS EMAIL SO GO HERE
2.Key logger
Key logger is the method by which we can easily known that which key strokes has been entered by victim on which web page and even now in markets key logger are coming that sends the screenshots of victims pc in seconds eg: Rinlogger and many more.
Key logger is also the best method for getting the passwords of Email accounts but in this we have to use some Social engineering for complete example of key logging go here. Key logger is of two types
(a) Direct Installation
In Direct Installation you have a .exe Setup file and you will execute that .exe file on your computer and when your victim’s use that computer then every keystrokes will be saved in a log file and when he goes from there open that log file and you can easily see the username and passwords of victim.
(b) Remote Installation
Remote Installation is the process by which you will use some social engineering and try to install key logger to victim’s computer like you will send or upload that exe file to your victim and tell the victim to open that For insist of opening here you will use social engineering you can tell victim about his/her likes eg. He likes porn’s so you will insist victim that open it will install live cam porn so victim will defienelty open that file and you have done you have successfully installed key logger on that pc , now you will start getting logs on you path which you have defined in that key logger like email id, ftp account etc.
3. Social Engineering
Social Engineering is basic the method of guessing eg. If you knows victim’s like or Dislikes so you can easily guess victim’s security questions and even password because everyone just choose password which victim like the most or the word victim’s speak most. In Email Account hacking or any type of hacking we have to use in every step eg. In phishing , In keylogging and many More.
In this posts every tutorial is for educational purpose only. we will not responsible for any loss.
No comments:
Post a Comment