Please Scroll Down to See Forums Below
napsgear
genezapharmateuticals
domestic-supply
puritysourcelabs
UGL OZ
UGFREAK
napsgeargenezapharmateuticals domestic-supplypuritysourcelabsUGL OZUGFREAK

Hackers...I need some help

brianharper94

New member
Does anyone know how to get into a yahoo account.....or completely fuck them up. This guy has sent my girlfriend a Trojan Virus and it has fucked up her computer. I want to do the same to him. Any help would be great.
 
Sure thing, here go to this site and download Munga Bunga Bruter force http hacker
http://www.hackology.com/enter.asp



and here is a little info on what it does
Munga Bunga's HTTP Brute Forcer is a utility utilizing the HTTP protocol to brute force into any login mechanism/system that requires a username and password, on a web page (or HTML form).

In simple terms, if you can access an account on the web, by entering a username and password (or more), then you can brute force into that account, using this utility.

Brute Forcing is the process of trying various passwords from a dictionary file (automatically), for a given username, until the password matches the username.

This method can sometimes be very effective. When you combine the power of brute forcing, with the functionality of the program, then you end up with a tool which can be used for breaking into emails, affiliate programs, web sites, (any web based accounts), launching DoS attacks, flood emails, flood forms, flood databases and all that your imagination can extend too! However, you should note that DoS attacks and flooding activity is not supported or documented in the documentation. The utility only supports Brute Forcing (documentation wise). It can be used for other purposes, if you know how to write the definitions to drive those forces.

Definition Files are files ending in the .def extension, and contain information about a particular server, and the data to submit to it. Definition files are typically written by users. They are used to extend the power and capability of the program, based on your own definitions. However, the software comes bundled with some definition files.

And don't ask me to tell you how to use it because if you can't figure it out, then you have no business using it, i'm not being mean, it's just ethics, you have to learn some of this shit on your own.
They have updated def files that you can download but you may need to write your own.

Later,
Dillon
 
Re: hacker

miles said:
If you can catch this guy using AOL instant message, or that other instant message thing from Microsoft, then you can really fry his ass. Send me an e-mail if you want to know more.

[email protected]

You guys worry me!! :D I need you guys to hack one of my competitors and get their database for me!! Who's up to it?
 
I'd be interested in hearing what the Hackers who responded so far.

In fact, everyone who resonded, take a crack at the yahoo user pkcs11 (yes it's mine). I've put a very unique attachment into the my inbox over there.

Because let's face, any bloke can do a search and vomit the hints and tips given thus far.

I'll give 500 bucks to the first member to tell me what the 'interesting' attachment is....
 
You guys worry me!! I need you guys to hack one of my competitors and get their database for me!! Who's up to it?

Sorry, but that would get me fired with my job with the NSA!:D
 
the brute force thing you are mentioning is a very low tech thing and it is easily overcome via smart programming.
not saying yahoo has that, but ...

that said, I'm with code - I see a lot of talking out of the ass here.

I'll fully admit, I can't see code's attachment.
even though I think we all know it is a Brittney Spears pic ;)
 
agreed

ya there were a few posts about brute forcing which is pretty low tech stuff. although it does work. since a lot of ppl use simle words or names or both to make their name and password. and most sites dont set a limit on how many times you can try to log in. also there are better ways to get into something on the net. as for getting into someones mail box, id have to say that anyone who is able to do it efficiently and without being caught is probly cracking something better. i personally enjoy using real tools like mappers and scanners and some custom things i have made. as for the trojan if you want one that is undetectable by the virus scanners and trojan scanners i have one i just made. let me know.
 
Code said:
I'll give 500 bucks to the first member to tell me what the 'interesting' attachment is....

Got it. Screw the $500... damn your mom is HOT! Thanks!!!

-Warik
 
Top Bottom