Advertisement
SLaychickentheroozte

How to jack social media accounts

Oct 16th, 2016
131
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 12.19 KB | None | 0 0
  1. How to jack social media accounts(Educational Purposes only)
  2. You could find a program to bruteforce accounts for a certain website. Database leak where all accounts would be compromised. Or you could infect people with RATs and hope they have the account you are looking for.
  3. ======================================================================================================================================
  4. Ratting or keylogging which will also be in this
  5. are one of the only ways.
  6. these are methods on how to Rat or keylog social media accounts or skype.
  7.  
  8.  
  9. Set up a keylogger
  10.  
  11. 1. Create an email.
  12. - The first step is to create an email to receive logs. I like using gmail.
  13.  
  14.  
  15. 2. Turn on insecure access.
  16. - Navigate to this url & switch it on. This will allow the keylogger to send & receive keylogs & passwords.
  17.  
  18.  
  19. 3. Input your credentials.
  20. - Put in your created email information.
  21.  
  22.  
  23. 4. Test delivery.
  24. - Hit the test delivery button to make sure your credentials were entered correctly.
  25.  
  26.  
  27. 5. Choose your settings.
  28. - There is no specific way to do this, just choose what you want to record & recover. If you are using HawkLogger you can find explanation of each feature in their user manual.
  29.  
  30.  
  31. 6. Build the file.
  32. - Press the build / compile button to create the keylogger file you will use to send to computers you want to keylog.
  33.  
  34.  
  35. 7. Use an encrypter/protector.
  36. - If you do not crypt the keylogger file then it will be removed by antiviruses on the computer you want to keylog (making it useless.) To make sure this doesn't happen you will need to buy a crypter from here or if you are using a keylogger like the one I am making the tutorial with that comes with a crypter/protector to remove detections all you have to do is use that.
  37.  
  38.  
  39. 8. Send the file.
  40. - Once sent to & downloaded by the computer you want to keylog you will start receiving emails with all keylogs & passwords.
  41. keylogger used (HawkLogger)
  42. theres many free or cheap keyloggers u can buy or download.
  43. Download from Hackforumn under hacking tool and programs on
  44. Keyloggers many on the topic.
  45. =========================================================================================================================================
  46.  
  47. How to properly setup a RAT (Remote Administration Tool)
  48.  
  49. Greeting members of HF. Today I will attempt to teach you guys how to set up your RAT. (remote administration tool) There are many steps to setting up a RAT but they are quite simple and almost anyone can do it. All you need is guidance to do so and that is exactly what I am going to do. Showing you how to properly setup a RAT from start to finish.
  50.  
  51. Where do I get a RAT?
  52.  
  53.  
  54. Some of you may be asking where can I get a RAT? My suggestion would be to purchase a RAT. My recommendations would be in no specific order, Nanocore, Imminent Monitor 3, or Luminosity Link which is a newer RAT.
  55.  
  56. You can find the marketplace threads here:
  57. IM3: here
  58. Nanocore: here
  59. Luminosity Link:here
  60.  
  61. If you are short on cash, you can find free RAT's. However these RAT's can be difficult to find cause many of these RAT's such as darkcomet and other free RAT's are outdated and are backdoored.
  62.  
  63. Setting Up Your New RAT
  64.  
  65.  
  66. Once you have secured your RAT, the steps are usually the same for most RAT's and that consists of several steps, depending on whether you want to use a home connection :P or if you want to use some korean host, the steps are the same unless your using an http RAT like kazy, which I can discuss how to that RAT up another time.
  67.  
  68. Port-forwarding
  69.  
  70.  
  71. This step is usually where I start off and it seems to be the step many people have great difficulty completing. Therefore, I will be providing a step by step process of how to port forward your router.
  72.  
  73. Firstly, to access your router. To do so, you must find your ip, this can be done simply by opening command prompt and typing <ipconfig> without the brackets of course. :P or sometimes you can just type http://home to connect instantly to your router.
  74.  
  75.  
  76.  
  77. Once you have done so, you will be greeted will a login page, if you have never seen this page before, chances are your username and password is admin/admin.
  78.  
  79. Once you have gained access to your router, depending on your router, the section called "Port forwarding" will exist on different headers. Once you have opened the port-forwarding menu, this varies by the type of router you have, but its functionality and its fields remains the same. For me I was greeted with this screen.
  80.  
  81.  
  82.  
  83.  
  84. Next, you *MUST* enter the ports you want to forward. I have chosen the port 6969 as seen as above :3. This port, I cannot stress enough, ***This port must be the same as the one chosen for your RAT to connect to!*** Once you have chosen the port, you must select the computer that is hosting the RAT.
  85.  
  86.  
  87.  
  88. Once that is all done, just hit some sort of save button and your done, you have successfully port-forwarded your RAT. Now for the next step.
  89.  
  90. Configuring Your New RAT
  91.  
  92.  
  93. Once you have your port forwarded, you must configure your RAT to actually connect to your computer before you can start spreading. For this demonstration, I will be using Nanocore because of its free 2 day trial. If you are using a different RAT, the ui will be different, but the steps should remain the same. I will be providing another step by step process for all of you.
  94.  
  95. For Nanocore and many other the rats, the process is very simple. Under the builder settings, where you create your RAT, it will ask you to input some information as follows.
  96.  
  97.  
  98.  
  99. Your connection host is the ip of the computer that is using the RAT and the ip of the computer which you portforwarded. This is very important that you input the same ip or the no-ip host of your computer. For example, the ip of my computer was found through cmd and it was used to access your router settings. Nanocore calls this your primary connection host, it is the field where you enter your ip address or your no ip address. Nanocore contains a backup connection host in case your main one goes down. If the RAT you own does not contain this field, its ok.
  100.  
  101.  
  102.  
  103. *Note that they are the same and must always be.*
  104.  
  105. Once you have entered your ip or your np-ip address into the builder settings, next you must enter the port it would connect to. This is why you port forwarded your port earlier.
  106.  
  107.  
  108.  
  109. As the case with the ip, the port you select your RAT to connect to must be the same as the port you forwarded earlier or you RAT will not work at all. Once you have that set up, your really done setting up your RAT. However I will also teach you how to test your RAT for any issues you may have had setting it up. I have seen countless times in the white hat help forums that people have ended up Ratting themselves. I will teach you how to prevent this and also how to test your rat to see if it actually works.
  110.  
  111. Testing Your RAT and its Functionality
  112.  
  113.  
  114. Testing your RAT is a pretty important step in starting you start spreading. The easiest way to do this is to install vm ware. VM ware can imitate any operating system and you can do whatever you want to it. It will not harm your actual host system.
  115.  
  116. First off you must download some sort of vmware. I use oracle's since its free and simple to use.
  117.  
  118. Oracle Vm Ware download link: here
  119.  
  120. Once you have some sort of vm ware, then you must get a copy of a windows iso, luckily for us, windows provides this for free for testing :3
  121.  
  122. How to setup windows on a virtual machine.
  123.  
  124.  
  125.  
  126.  
  127. Thank you TheTechVlog for the video.
  128.  
  129. Once you have vmware and windows setup on your computer, you can begin testing. For example, you can send your malware to the computer on vmware to see if your RAT can connect back to your main pc. You can also test all the features that you RAT has and such. .
  130.  
  131. Spreading
  132.  
  133.  
  134. Before you start spreading, you need a crypter, since I never actually spread my RAT before, only played around with it to see how it functioned and how to prevent it, I cannot suggest any good crypters to you. However, not all crypters work for every RAT. It all depends on the language the RAT was written in and you MUST buy a crypter, free ones do not work.
  135.  
  136. If you are asking yourself "what is a crypter?" It is a pretty simple explanation, it disguises your malware so it cannot be detected my AV's and anti-malware scanners. There is no point in spreading your RAT if it gets caught by AV's so a crypter is necessary in spreading.
  137.  
  138. Thats all I have to share with you guys, if I left out any key aspects of setting up a RAT, just hit me a pm. If there are any spelling or grammar errors, just reply on this thread. This is a generic guide and should be used as a baseline in setting up any non-Http rat. I hope you guys found this tut useful.
  139. In case the admin/admin login doesnt work, here are some other variations.
  140.  
  141. admin/blank (no password)
  142. admin/password
  143. admin/user
  144. admin/root
  145. root/admin
  146. root/blank (no password)
  147. root/password
  148. root/root
  149. root/password
  150. user/root
  151. user/blank (no password)
  152. user/admin
  153. user/password
  154. user/user
  155. Q&A
  156.  
  157.  
  158. Is Ratting Illegal?
  159. Ratting is illegal, this is falls under hacking, if you get caught, it will be a prison sentence. That is why it is advised to use no-ip or to use a offshore server where you can command your RAT from there.
  160.  
  161. How Do I Know If I Port-forwarded Correctly?
  162. There are various websites such as canyouseeme which will tell you if your port is open.
  163.  
  164. Where Can I Buy A Rat Or Crypter?
  165. Marketplace is the best place, only buy very popular ones as they will usually be supported for a number of years.
  166.  
  167. I do not/cannot buy a RAT. What Free One's Should I Get?
  168. I advise if you cannot buy a RAT, I would get darkcomet or cybergate. Leaked versions of payed RAT's do not work and are usually backdoored.
  169.  
  170. I send RAT's to people, but sometimes they dont connect.
  171. Most likely they will have an AV that is detecting your RAT and cleaning it, that is why you invest in a crypter.
  172.  
  173. I suddenly lost all my slaves on my Home Connection.
  174. You most likely have a dynamic ip, what this means is your isp will change your ip time to time, as a result you will lose all your slaves cause your RAT is now connecting to a non existent ip.
  175.  
  176. Will My ISP find out I have a RAT?
  177. If you have a large amount of connections on your home network, then your isp will take notice and begin investigating. That is why it is advised to use no-ip (they delete your account around 500 connections) or use a server.
  178.  
  179. When I setup my RAT, I cant download it and/or extract it.
  180. Your AV is blocking your RAT cause of its malicious nature. This can be one of two cases, your RAT is backdoored, or your RAT is being seen as a false positive. Use sandboxie inside vmware to determine if your RAT in indeed backdoored.
  181. theres a lot of rats u can download like Dark comit or Nanocore ect.if you need help setting thme up google search what you need setup and what program
  182. ========================================================================================================================================
  183. another way to jack a Social media account is to Brute force
  184. ========================================================================================================================================
  185. (Description)
  186. Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than employing intellectual strategies.
  187. ========================================================================================================================================
  188. you'll need specific combos, configs, and proxies for whatever you're going to try to crack. There are a bunch of public combos and configs but proxies you might have to buy. use thigs like Sentry MBA or Hydra which u can get for kali linux
  189. buy or get program to brute force.One of the most common techniques is known as brute force password cracking. Using tools such as Hydra, you can run large lists of possible passwords against various network security protocols until the correct password is discovered.
  190. u can bruteforce any social media accounts.may not always work.
  191. ========================================================================================================================================
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement