jerseycity02

My first post; and a very important one.

26 posts in this topic

Sorry if this is the wrong section but I am a noobie here. Lol, and I do really really really need some help. Well I know its possible and I wanna be able to do this, anyone know anyway to hack someones forum account. I wont and swear I will not use it hear. I need it for another site. Prick hotlinked my media. Anyhow that or disabling someones MSN account.

Anyhelp greatly appreciated.

0

Share this post


Link to post
Share on other sites

i'm not sure if i could help you or not, how ever i will point you in the right direction

Look for exploits for the forum

attempt to social engineer the person

attempt to guess his pass maybe?

or i SURPOSE you could attempt to install a keylogger on his computer..then tell him to log into his account.

thats all the info i think i'm allowed to give you

hope it helps :D

p.s. why do you want to get into his account?

0

Share this post


Link to post
Share on other sites

Thanks a lot. I wanna get into HER account because of many reasons. She used me basically for media and scans but then I was like whatever, life goes on. Only afterwords to find out she disabled my msn and hacked my site. So that just fires me up to get her back. And I saved it every step of the way so if I get caught dumb ho is going down with me :D thanks again = D

edit: im such a noob :P whats an exploit?

Edited by Widows Peak Freak
0

Share this post


Link to post
Share on other sites

Don't waste your time trying to get revenge for this.

Just have some beer and enjoy the weekend :)

0

Share this post


Link to post
Share on other sites

why not just ask her how she did it? she'd probably tell you, if you said that you thought it was neat what she did.. 'thats so cool!! how'd you do it?'

perhaps she'd tell you.

0

Share this post


Link to post
Share on other sites

Wait a minute, it's a SHE? Wow. I've never met a female hacker... if I was you I'd be interested in her. lol

0

Share this post


Link to post
Share on other sites

Oh man, we're everywhere!

/she has some beer and enjoys the weekend java script:emoticon(':)', 'smid_4')

0

Share this post


Link to post
Share on other sites

right a lil tip, i had a gf who screwed me around...so i went to get revenge and i taken to court. If i were you i'd do what everone else says just let it go...OR if you wanna be vendictive...just watch her for a whle wait til she gets summin good goin in her life n wreck it :D

:devil:

(yes i am a vendictive bugger)

0

Share this post


Link to post
Share on other sites

Wait a minute, it's a SHE? Wow. I've never met a female hacker... if I was you I'd be interested in her. lol

I found that women know more about computers then guys.

0

Share this post


Link to post
Share on other sites

if your media is hotlinked... why don't you change it out with some nasty Goatse or tub girl pictures and place those in another directory..?

0

Share this post


Link to post
Share on other sites

if your media is hotlinked... why don't you change it out with some nasty Goatse or tub girl pictures and place those in another directory..?

agreed, if thats your only problem, but it seems its not.

how much power do you have over the hosting server, if you have full access, you may be able to inject PHP by using a redirect

0

Share this post


Link to post
Share on other sites

nah i doubt he has that much power, but honestly its probs best 2 just annoy her to death..email bombs and the such..OR you could use annonymus emails and scare her a little....but meh if it iwas me i'd let it go and let fate deal with her..less work

0

Share this post


Link to post
Share on other sites

if your media is hotlinked... why don't you change it out with some nasty Goatse or tub girl pictures and place those in another directory..?

I suggest doing that.

0

Share this post


Link to post
Share on other sites

Wait a minute, it's a SHE? Wow. I've never met a female hacker... if I was you I'd be interested in her. lol

I found that women know more about computers then guys.

From my personal experience I've never really met a girl (in real life) who knew a lot about computers. I hope this will change in the future. Btw, are there many girls on binrev? I tend to assume most people are guys.

0

Share this post


Link to post
Share on other sites

C:\> telnet smtp.herserver.net 25
HELO
MAIL FROM: dhs@whitehouse.gov
RCPT TO: her@herserver.net
DATA
SUBJECT: Computer Crime
Dear Her,
You have committed a serious computer crime known as "illegal hotlinking". A webmaster has filed an official complaint against you. We will be investigating you. Etc, etc, etc...
.
quit

:devil:

Edited by n3xg3n
0

Share this post


Link to post
Share on other sites

C:\> telnet smtp.herserver.net 25
HELO
MAIL FROM: dhs@whitehouse.gov
RCPT TO: her@herserver.net
DATA
SUBJECT: Computer Crime
Dear Her,
You have committed a serious computer crime known as "illegal hotlinking". A webmaster has filed an official complaint against you. We will be investigating you. Etc, etc, etc...
.
quit

:devil:

Dude thats genious will it really work? And where do I insert it at?

0

Share this post


Link to post
Share on other sites

Google "Email Spoofing"

you basically telnet into her SMTP server (mail server) and put in some SMTP commands

the tutorial that i researched into when i first learned (i modded a few lines to make them more explicitory) and modded the credit thing :D

~This Article was //mostly// Written by Blinky, Not Me, I give him //90%// credit~~

So, I heard you wanted to learn how to spoof emails so you can email people making it look like its from some other email, right? Well you have come to the right spot. Ok, first off you gotta know what tool you use you spoof. This tool is called Telnet. On windows you will need to go Start > Run then type in cmd and push enter. On macs (im not very familiar with them) go to utilities and go to "Console." Ok, you might be wondering, but wait a minute where is telnet? Well if you are in command prompt (cmd) or in Console it is command based, so for example you will type in "telnet hostname.com port" So lets get to the basics now that you know how to get to telnet. When you are in cmd or console you want to connect to a website on the smpt port (basically the mail protocol port that allows emails to transfer through). So lets take hotmail for example, type in:

telnet mail.hotmail.com 25

Now push enter, it connects to hotmail. Lets break it down so you know how it works. Typing telnet will tell it what program to run, so whenever you want to use telnet type telnet first, the mail.hotmail.com section is telling telnet what address to connect to. Finally, the number 25 is the mail protocol port, you will need to use this to let telnet know that you want to connect through the mail port so you can access the mail server on the address. An example of other ports is 21 which is FTP port, and port 80 which is http, you can expirement with these if you would like.

Now, once you get a message on telnet saying you have connected and some technical crap you dont need to worry about :) you can begin. Write out:

HELO

This is interpreted as saying a simple "Hello" to the server, and on hotmail it will say "HELO xxx.xxx.xxx.xxx the xxx being your IP address. Now dont be scared spoofing emails is something the other people can not do anything about to you.

Next is where the spoofing comes in. Write:

MAIL FROM: (Email you want it to send FROM)

Make sure you do NOT include the parenthesis ( ) ie. MAIL FROM: Joe@email.com This is just telling the mail server where the mail is labeled to come from. You can choose any email address with the MAIL FROM: command.

Now you need to choose who to mail TO, type this:

RCPT TO: (Email you want it to send TO)

Again, do NOT include the parenthesis ( ) ie. RCPT TO: HotmailUser@Hotmail.com This is telling the server where to mail the email to. RCPT is basically abbreviated as Recipiant. If it does not accept RCPT TO: email then try spacing the TO : email between each, depending on the email server. With this you NEED to have it email to hotmail, or the mail server you connected to.

Now that you have the emails down pat its time to actually write the Email. Write:

DATA

Then press enter, this is just telling the server its time to write down the msg and subject, now write this:

SUBJECT: (PUT YOUR SUBJECT HERE)

Again, dont put parenthesis ( ) unless you actually want parenthesis ( ) in the subject. Now once you pushed enter after the subject, write what you want in the actually body of the email. Once you finished writing the message push enter, then write

.

and push enter, it will say something about the mail is queued for delivery and it should arrive to the mail box very shortly.

quit

and push enter, mail will be sent, and connection closed

Now wasnt that easy? You have just spoofed your very own email, what you do with this knowledge is none of my business, have fun and good luck!

Tips And Answers to Problems:

1. Make sure you never mistype something and hit backspace, it will end up writing out weird characters and that would be a sign that the email is spoofed, so if you end up mistyping something, start over.

2. If the message is too long to type because it timesout and kicks you off then type the message in notepad or any writing processor and then copy it, when it gets to the message part right click on there and click paste, or if on a mac just paste it how you normally do.

3. Some email servers allow relaying (being able to send to ANYONE instead of someone just on that server) but not alot of mail servers allow that.

4. In case you arent sure if something will work, its a good idea to send it to your self so everything looks fine then send it to your target.

Edited by n3xg3n
0

Share this post


Link to post
Share on other sites

I does not work, thats true ^^.

Maybe the spoiler is old.

HaNoCr

:P

0

Share this post


Link to post
Share on other sites

Thanks dude !

:)

It’s the easiest tool I have ever seen for it, so you shouldn’t have any issues.

Net Tools 4.5 (build 74) contains a whole variety of network tools. Here is a list of the most important tools:

1) IP Address Scanner

2) IP Calculator

3) IP Converter

4) Port Listener

5) Port Scanner

6) Ping

7) NetStat (2 ways)

8) Trace Route (2 ways)

9) TCP/IP Configuration

10) Online - Offline Checker

11) Resolve Host & IP

12) Time Sync

13) Whois & MX Lookup

14) Connect0r

15) Connection Analysator and protector

16) Net Sender

17) E-mail seeker

18) Net Pager

19) Active and Passive port scanner

20) Spoofer

21) Hack Trapper

22) HTTP flooder (DoS)

23) Mass Website Visiter

24) Advanced Port Scanner

25) Trojan Hunter (Multi IP)

26) Port Connecter Tool

27) Advanced Spoofer

28) Advanced Anonymous E-mailer

29) Simple Anonymous E-mailer

30) Anonymous E-mailer with Attachment Support

31) Mass E-mailer

32) E-mail Bomber

33) E-mail Spoofer

34) Simple Port Scanner (fast)

35) Advanced Netstat Monitoring

36) X Pinger

37) Web Page Scanner

38) Fast Port Scanner

39) Deep Port Scanner

40) Fastest Host Scanner (UDP)

41) Get Header

42) Open Port Scanner

43) Multi Port Scanner

44) HTTP scanner (Open port 80 subnet scanner)

45) Multi Ping for Cisco Routers

46) TCP Packet Sniffer

47) UDP flooder

48) Resolve and Ping

49) Multi IP ping

50) File Dependency Sniffer

51) EXE-joiner (bind 2 files)

52) Encrypter

53) Advanced Encryption

54) File Difference Engine

55) File Comparasion

56) Mass File Renamer

57) Add Bytes to EXE

58) Variable Encryption

59) Simple File Encryption

60) ASCII to Binary (and Binary to ASCII)

61) Enigma

62) Password Unmasker

63) Credit Card Number Validate and Generate

64) Create Local HTTP Server

65) eXtreme UDP Flooder

66) Web Server Scanner

67) Force Reboot

68) Webpage Info Seeker

69) Bouncer

70) Advanced Packet Sniffer

71) IRC server creater

72) Connection Tester

73) Fake Mail Sender

74) Bandwidth Monitor

75) Remote Desktop Protocol Scanner

76) MX Query

77) Messenger Packet Sniffer

78) API Spy

79) DHCP Restart

80) File Merger

81) E-mail Extractor (crawler / harvester bot)

82) Open FTP Scanner

83) Advanced System Locker

84) Advanced System Information

85) CPU Monitor

86) Windows Startup Manager

87) Process Checker

88) IP String Collecter

89) Mass Auto-Emailer (Database mailer; Spammer)

90) Central Server (Base Server; Echo Server; Time Server; Telnet Server; HTTP Server; FTP Server)

91) Fishing Port Scanner (with named ports)

92) Mouse Record / Play Automation (Macro Tool)

93) Internet / LAN Messenger Chat (Server + Client)

94) Timer Shutdown/Restart/Log Off/Hibernate/Suspend/ Control

95) Hash MD5 Checker

96) Port Connect - Listen tool

97) Internet MAC Address Scanner (Multiple IP)

98) Connection Manager / Monitor

99) Direct Peer Connecter (Send/Receive files + chat)

100) Force Application Termination (against Viruses and Spyware)

101) Easy and Fast Screenshot Maker (also Web Hex Color Picker)

102) COM Detect and Test

103) Create Virtual Drives

104) URL Encoder

105) WEP/WPA Key Generator

106) Sniffer.NET

107) File Shredder

108) Local Access Enumerater

109) Steganographer (Art of hiding secret data in pictures)

110) Subnet Calculater

111) Domain to IP (DNS)

112) Get SNMP Variables

113) Internet Explorer Password Revealer

114) Advanced Multi Port Scanner

115) Port Identification List (+port scanner)

116) Get Quick Net Info

117) Get Remote MAC Address

118) Share Add

119) Net Wanderer

120) WhoIs Console

121) Cookies Analyser

122) Hide Secret Data In Files

123) Packet Generator

124) Secure File Splitting

125) My File Protection (Password Protect Files, File Injections)

126) Dynamic Switch Port Mapper

127) Internet Logger (Log URL)

128) Get Whois Servers

129) File Split&Merge

130) Hide Drive

131) Extract E-mails from Documents

132) Net Tools Mini (Client/Server, Scan, ICMP, Net Statistics, Interactive, Raw Packets, DNS, Whois, ARP, Computer's IP, Wake On LAN)

133) Hook Spy

134) Software Uninstaller

135) Tweak & Clean XP

136) Steganographic Random Byte Encryption

137) NetTools Notepad (encrypt your sensitive data)

138) File Encrypter/Decrypter

139) Quick Proxy Server

140) Connection Redirector (HTTP, IRC, ... All protocols supported)

141) Local E-mail Extractor

142) Recursive E-mail Extractor

143) Outlook Express E-mail Extractor

144) Telnet Client

145) Fast Ip Catcher

146) Monitor Host IP

147) FreeMAC (MAC Address Editor)

148) QuickFTP Server (+user accounts support)

149) NetTools Macro Recorder/Player (Keybord and Mouse Hook)

150) Network Protocol Analyzer

151) Steganographic Tools (Picture, Sounds, ZIP Compression and Misc Methods)

152) WebMirror (Website Ripper)

153) Extra Tools (nmap console & win32 version)

0

Share this post


Link to post
Share on other sites

I found that women know more about computers then guys.

I need to meet the women you know then.

Edited by Affinity
0

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!


Register a new account

Sign in

Already have an account? Sign in here.


Sign In Now