New here? Post 10 threads to unlock access to threads, or upgrade now to access Crax all content instantly!
Join CraxPro and earn real money through our Credit Rewards System. Participate and redeem credits for Bitcoin/USDT. Start earning today! Read the detailed thread here
You are using an out of date browser. It may not display this or other websites correctly. You should upgrade or use an alternative browser.
HELLO, EVERYONE, WE WILL DISCUSSING ACCOUNT CRACKING! | METHODS TO GET BETTER IN ACCOUNT CRACKING |
OK, WE STARTED WITH BASICS!
WHAT IS THE ACCOUNT CRACKING?!
Cracking” is the act of obtaining unauthorized access into a computer system without the user’s permission and knowledge. Cracking doesn’t require extensive hacking knowledge and capabilities, but rather a persistence and the dogged repetition of tricks that exploit common weaknesses in a targeted system or account!
so this is a question, what is cracking used for?!
for example, you don’t have money to buy expensive game’s! and also you really want to play that game! so you can crack other people account and use them for free!
HOW WE CAN CRACK ACCOUNTS?!
account cracking almost a simple process! you just need to put Email and Password on Login webpage and if the email & pass was correct you can access to the account and do but never you want and if it’s incorrect you need to use other email and password! for that you need to use crackers, checker/cracker is a program to check all email: pass to the login page! and if a some of them was correct, program give it to you as Hit
you need to use crackers/checkers and combo list:
WHAT IS A COMBOLIST AND HOW TO MAKE IT?
Combolist is actually info that you need to put into a Login page to access the account! we have 2 type of combos!
Email:Password = yourname@Email.com:admin123
User:Password = yourname:admin123
you need to use E:P for the site’s that you need an email to log in at it same about U:P combo!
E:P to site’s like origin, facebook, Spotify, Uplay, ETC
U:P to site’s like Steam, Instagram, and also you can use both E:P and U:P to same site’s! like Instagram, origin, and more
we have 3 methods to get ComboList!
1- dumping combo’s from Databases User SQLI Dumper!
2- Leech Combos from sites like Pastebin!
3- buy combos from guys who sell it!
for the first method we looking after this post!
the second method it’s so easy! you just need to download PastebinLeecher, put your keyword and leeching combos!
How to make combo using SQLI Dumper
WHAT IS THE SENTRYMBA AND HOW IT’S WORK?!
Sentry MBA: A Tale Of The Most Popular Credential Stuffing Attack Tool
if you want to crack specific site account but you didn’t find any cracker for that site you can use sentryMBA and make a config for that site and start attacking them!
also making config for sentry doesn’t easy you can watch this video it will help you a lot.
THE WAYS TO CRACK ACCOUNT?!
there are just a few ways to crack accounts!
1- using crackers/checkers to crack accounts
2- using sentryMBA or Storm for cracking!
3- using AIO for MailAccess Cracking! (the Easy way)
WHAT SITE’S ACTUALLY DO AGAINST CRACKERS?!
some of them try hard to make crackers broken just like PSN … but crackers do they ways and try to find a bypass!
these are some issues in cracking
– IM NOT ROBOT! (GOOGLE RECAPTCHA) And Captcha(you can bypass it with SentryMBA) for Recaptcha there are some site’s that you can pay them for bypassing recaptcha like DBC, 2captcha, ETC ETC
– Account 2step verification
– Account Guard(Email, Phone)(Steam)
– some of them get account limited if the passenger access to the account like Paypal
HOW WE CAN BE SAFE AGAINST CRACKERS?
– don’t tell anyone your main password!
– don’t click on any link!
– don’t use public email and password for your account!
– don’t use easy passwords for your social media accounts
– don’t trust anyone!
– don’t download any app! run them on VM or Sandboxie
IS THIS GOOD TO CRACKING ON OUR LAPTOP OR COMPUTER?
– I always say don’t use your own PC for cracking and stuff like this! why?!
cause cracking need HQ speed Internet and traffic
– your IP address will be ban by google
– take a lot of time (For example using NLbrute can spend time about 23H or + )
– can take serious damage on your PC! (this happens on my own)
so what we can do for cracking!?
you need to buy RDP/VPS from databases! like Amazon, 1&1, GoDaddy, AmazingRDP, ETC ETC
What IS A VPS/RDP AND HOW TO USE THEM?
emote Desktop is a program that allows you to connect to your Windows VPS machine from the remote location and allow you to take a complete control of that virtual machine.
the virtual machine is just like other PC’s and laptops, it has windows but! it has more power and more speed than your own computer! you can crack any type of account with that faster/safer
PROXY?!
A proxy server is a dedicated computer or a software system running on a computer that acts as an intermediary between an endpoint device, such as a computer, and another server from which a user or client is requesting a service
for example! you test about 10 email and password on random login page! and the site gets your IP address ban :pepe: that’s why you need to use Proxies!
we have some Proxies Types and levels!
HTTP
HTTPS
SOCKS 5/4
Anonymous
An anonymous proxy does not send your real IP address in the HTTP_X_FORWARDED_FOR header, instead, it submits the IP address of the proxy or is just blank.
Transparent
A transparent proxy sends your real IP address in the HTTP_X_FORWARDED_FOR header, this means a website that does not only determine your REMOTE_ADDR but also checks for specific proxy headers will still know your real IP address.
ELITE
An elite proxy only sends REMOTE_ADDR header, the other headers are blank/empty, hence making you seem like a regular internet user who is not using a proxy at all.
Hope You Learn Something from This Thread!
HELLO, EVERYONE, WE WILL DISCUSSING ACCOUNT CRACKING! | METHODS TO GET BETTER IN ACCOUNT CRACKING |
OK, WE STARTED WITH BASICS!
WHAT IS THE ACCOUNT CRACKING?!
Cracking” is the act of obtaining unauthorized access into a computer system without the user’s permission and knowledge. Cracking doesn’t require extensive hacking knowledge and capabilities, but rather a persistence and the dogged repetition of tricks that exploit common weaknesses in a targeted system or account!
so this is a question, what is cracking used for?!
for example, you don’t have money to buy expensive game’s! and also you really want to play that game! so you can crack other people account and use them for free!
HOW WE CAN CRACK ACCOUNTS?!
account cracking almost a simple process! you just need to put Email and Password on Login webpage and if the email & pass was correct you can access to the account and do but never you want and if it’s incorrect you need to use other email and password! for that you need to use crackers, checker/cracker is a program to check all email: pass to the login page! and if a some of them was correct, program give it to you as Hit
you need to use crackers/checkers and combo list:
WHAT IS A COMBOLIST AND HOW TO MAKE IT?
Combolist is actually info that you need to put into a Login page to access the account! we have 2 type of combos!
you need to use E:P for the site’s that you need an email to log in at it same about U:P combo!
E:P to site’s like origin, facebook, Spotify, Uplay, ETC
U:P to site’s like Steam, Instagram, and also you can use both E:P and U:P to same site’s! like Instagram, origin, and more
we have 3 methods to get ComboList!
1- dumping combo’s from Databases User SQLI Dumper!
2- Leech Combos from sites like Pastebin!
3- buy combos from guys who sell it!
for the first method we looking after this post!
the second method it’s so easy! you just need to download PastebinLeecher, put your keyword and leeching combos!
How to make combo using SQLI Dumper
WHAT IS THE SENTRYMBA AND HOW IT’S WORK?!
Sentry MBA: A Tale Of The Most Popular Credential Stuffing Attack Tool
if you want to crack specific site account but you didn’t find any cracker for that site you can use sentryMBA and make a config for that site and start attacking them!
also making config for sentry doesn’t easy you can watch this video it will help you a lot.
THE WAYS TO CRACK ACCOUNT?!
there are just a few ways to crack accounts!
1- using crackers/checkers to crack accounts
2- using sentryMBA or Storm for cracking!
3- using AIO for MailAccess Cracking! (the Easy way)
WHAT SITE’S ACTUALLY DO AGAINST CRACKERS?!
some of them try hard to make crackers broken just like PSN … but crackers do they ways and try to find a bypass!
these are some issues in cracking
– IM NOT ROBOT! (GOOGLE RECAPTCHA) And Captcha(you can bypass it with SentryMBA) for Recaptcha there are some site’s that you can pay them for bypassing recaptcha like DBC, 2captcha, ETC ETC
– Account 2step verification
– Account Guard(Email, Phone)(Steam)
– some of them get account limited if the passenger access to the account like Paypal
HOW WE CAN BE SAFE AGAINST CRACKERS?
– don’t tell anyone your main password!
– don’t click on any link!
– don’t use public email and password for your account!
– don’t use easy passwords for your social media accounts
– don’t trust anyone!
– don’t download any app! run them on VM or Sandboxie
IS THIS GOOD TO CRACKING ON OUR LAPTOP OR COMPUTER?
– I always say don’t use your own PC for cracking and stuff like this! why?!
cause cracking need HQ speed Internet and traffic
– your IP address will be ban by google
– take a lot of time (For example using NLbrute can spend time about 23H or + )
– can take serious damage on your PC! (this happens on my own)
so what we can do for cracking!?
you need to buy RDP/VPS from databases! like Amazon, 1&1, GoDaddy, AmazingRDP, ETC ETC
What IS A VPS/RDP AND HOW TO USE THEM?
emote Desktop is a program that allows you to connect to your Windows VPS machine from the remote location and allow you to take a complete control of that virtual machine.
the virtual machine is just like other PC’s and laptops, it has windows but! it has more power and more speed than your own computer! you can crack any type of account with that faster/safer
PROXY?!
A proxy server is a dedicated computer or a software system running on a computer that acts as an intermediary between an endpoint device, such as a computer, and another server from which a user or client is requesting a service
for example! you test about 10 email and password on random login page! and the site gets your IP address ban :pepe: that’s why you need to use Proxies!
we have some Proxies Types and levels!
HTTP
HTTPS
SOCKS 5/4
Anonymous
An anonymous proxy does not send your real IP address in the HTTP_X_FORWARDED_FOR header, instead, it submits the IP address of the proxy or is just blank.
Transparent
A transparent proxy sends your real IP address in the HTTP_X_FORWARDED_FOR header, this means a website that does not only determine your REMOTE_ADDR but also checks for specific proxy headers will still know your real IP address.
ELITE
An elite proxy only sends REMOTE_ADDR header, the other headers are blank/empty, hence making you seem like a regular internet user who is not using a proxy at all.
Did you know? China has the most hackers in the world after USA.
Did you know?Kevin Mitnick isn't only the No.1; but the richest hacker in the world too.
Did you know?Python is the most popular Programming Language used by hackers.
Did you know? In 1971, John Draper found a way to make free phone calls reported as one of the 1st hack.
Did you know?Yahoo was hacked and it's DB with 3 Billion Records was exposed, it's known as one of the biggest hacks in history.
Did you know? The 1st Virus was made in 1986 by 2 Pakistani Brother's; called the Brain.
Did you know?Facebook was a stolen idea from the Winklevoss brothers by Mark Zuckerberg. Later on they sued him for $65 million Dollars. [Movie: The Social Network]
"Hacking involves a different way of looking at problems that no one's thought of." [Walter O'Brien]
"When solving problems, dig at the roots instead of just hacking at the leaves."[Anthony J. D'Angelo]
“Computer hacking was like a chemical bond holding us all together.” [Rachel Zhang]
“Hacking is like sex, you need breath, in the last step, you feel incredible pleasure and the best time to practice it is at night.”- Amine Essiraj
“Don't Hate me, Hate that Code” ― Vedant Access
“No technology that's connected to the internet is unhackable.” ― Abhijit Naskar
“Time is what determines security. With enough time nothing is unhackable.” ― Aniekee Tochukwu Ezekiel
“Writing code is one of the most peaceful things one can do if the intentions are right.” ― Olawale Daniel
“No night of drinking or drugs or sex could ever compare to a long evening of productive hacking.” ― Lynn Voedisch
“Be a mind hacker and find your natural Self.” ― Bert McCoy
“There Could be something more Dangerous Behind that Firewall `)” ― Vedant Access
“Why should I apologize for being a HACKER? Has anyone ever apologized for turning me into one?” ― Harsh Mohan
“Hacking is a talent. You won't learn it at school. It's like being Messi or C.Ronaldo. If you were born to become a Hacker, it's your destiny. Otherwise, you'll be Hacked.” ― Amine Essiraj
“One of the best things about hacking is the buzz you get when you find your way into some place you're not meant to be.” ― Thalia Kalkipsakis
“If you are a good hacker everybody knows you, But if you are a great hacker nobody knows you.” ― Rishabh Surya
“The quieter you become, the more you are able to hear…” ― Kali Linux
“Most hackers are young because young people tend to be adaptable. As long as you remain adaptable, you can always be a good hacker.” ― Emmanuel Goldstein
“It is not the monsters we should be afraid of; it is the people that don’t recognize the same monsters inside of themselves.” ― Shannon L. Alder
“What hackers do is figure out technology and experiment with it in ways many people never imagined. They also have a strong desire to share this information with others and to explain it to people whose only qualification may be the desire to learn.” ― Emmanuel Goldstein
"I couldn't think as slow as you if I tried." --DJ Qualls in 'The Core'
"Let the hacking begin." --Jesse Eisenberg in 'The Social Network'
"S'all Good, Man."
--BCS
“Tell me and I forget, teach me and I may remember, involve me and I learn.” – Benjamin Franklin
"When it comes to success, there are no shortcuts." --Bo Bennett
"Perfection Is The Enemy Of Perfectly Adequate."
--BCS
"Money Is The Point!"
--BCS
“I’m good at reading people. My secret? I look for the worst in them.” ― Mr. Robot
"I Travel In Worlds You Can't Even Imagine."
--BCS
““I’ve never found it hard to hack most people. If you listen to them, watch them, their vulnerabilities are like a neon sign screwed into their heads.”” ― Mr. Robot
"Say Nothing, You Understand? Get A Lawyer!"
--BCS
“I never want to be right about my hacks, but people always find a way to disappoint.” ― Mr. Robot
“Confidence is good. Facts on your side, better.”
--BCS
“A bug is never just a mistake. It represents something bigger. An error of thinking that makes you who you are.” ― Elliot
"No crime is complete without the cover-up." --BCS
“Never trust a tech guy with a rat tail—too easy to carve secrets out of him.” ― Mr. Robot
“I’ve never found it hard to hack most people. If you listen to them, watch them, their vulnerabilities are like a neon sign screwed into their heads.” ― Mr. Robot
“Cracking:- Where the LAW starts from.” ― Mr. Thanos
“Facts are facts.”
--BCS
“Spamming:- Where we use the LAW.” ― Mr. Thanos
“Sometimes the good guys win.”
--BCS
“Carding:- Where we create chaos using the LAW.” ― Mr. Thanos
“I’m not good at building shit, you know? I’m excellent at tearing it down.”
--BCS
“Money is not beside the point… Money is the point.”
--BCS
“Hacking:- Where there is no LAW.” ― Mr. Thanos
“Whoa, whoa. Hold up. What the hell happened to you? I get it, the first rule of Fight Club, right?”
--BCS
“Alert:- Please use RDP or Sandboxie before using any tools”
“A good magician never reveals his secrets.”
--BCS
“Got to look successful to be successful.”
--BCS
“The lesson is, if you’re gonna be a criminal, do your homework.”
— Mike Erhmantraut (BCS)
“If I had to do it all over again, I would maybe do some things differently. I just thought you should know that.”
--BCS
“Some men aren't looking for anything logical. They can't be bought, bullied, reasoned or negotiated with. Some men just want to watch the world burn.”
--BATMAN: THE DARK KNIGHT
"Ernest Hemingway once wrote, "The world is a fine place and worth fighting for." I agree with the second part."
--Seven
“There’s no better way to destroy someone’s life than to uncover their secrets.”
“Hackers are breaking the systems for profit. Before, it was about intellectual curiosity and pursuit of knowledge and thrill, and now hacking is big business.”
― Kevin Mitnick
“Hackers often describe what they do as playfully creative problem-solving.”
― Heather Brooke
“Computer hackers do not need to know each other’s real names, or even live on the same continent, to steal millions in mere hours."
-- Robert Mueller
“While many hackers have the knowledge, skills, and tools to attack computer systems, they generally lack the motivation to cause violence or severe economic or social harm.”
― Dorothy Denning
“Very smart people are often tricked by hackers, by phishing. I don’t exclude myself from that. It’s about being smarter than a hacker. Not about being smart.”
― Harper Reed
“At the end of the day, my goal was to be the best hacker.”
– Kevin Mitnick
“Humiliation is the favorite currency of the hacker.”
— Sherlock Holmes
“The hacker didn’t succeed through sophistication. Rather he poked at obvious places, trying to enter through unlocked doors. Persistence, not wizardry, let him through.”
— Clifford Stoll
"Rules. Without Them We Live With The Animals.”
--John Wick
“Consider This A Professional Courtesy.”
--John Wick
"I've Lived My Life My Way, And I'll Die My Way."
--John Wick
"You stabbed the devil in the back, and forced him back into the life that he had just left."
--John Wick
"You Want A War, Or Do You Want To Just Give Me A Gun?"
--John Wick
"Leave one wolf alive and the sheep are never safe."
--GOT
"When you play the game of thrones, you win or you die. There is no middle ground."
--GOT
"It's not easy to see something that’s never been before: A good world."
--GOT
"I believe in second chances. I don't believe in third chances."
--GOT
"If you only trust the people you grew up with, you won't make many allies."
--GOT
"A man with no motive is a man no one suspects. Always keep your foes confused: If they don't know who you are, what you want—they can't know what you plan to do next."
--GOT
"Never forget what you are, the rest of the world will not. Wear it like armor and it can never be used to hurt you."
--GOT
"I try to know as many people as I can. You never know which one you'll need."
--GOT
"It's hard to put a leash on a dog once you've put a crown on its head."
--GOT
“Everything before the word ‘but’ is horseshit.”
--GOT
“A lion doesn’t concern himself with the opinions of a sheep.”
--GOT
“Nothing FUCKS you harder than time.”
--GOT
“You pray for rain, you gotta deal with the mud too. That’s a part of it.”
--Denzel Washington.
“I’d be more frightened by not using whatever abilities I’d been given.”
--Denzel Washington.
“Luck is where opportunity meets preparation.”
--Denzel Washington.
“If you have an enemy, then learn and know your enemy, don’t just be mad at him or her.”
--Denzel Washington.
“Every failed experiment is one step closer to success.”
--Denzel Washington.
When you work on a computer your hands travel 20 kilometres a day!
Fugaku supercomputer is the world’s fastest computer. The $1-billion supercomputer has 7,630,848 cores, requires 29,899 kilowatts of electricity, and can execute 442,010 teraFLOPs.
“Every day, about 317 million new viruses are discovered.
“Microsoft’s founder, the infamous Bill Gates, was actually a college dropout."
Did you know?
“On average, a human blinks 20 times per minute, but using a computer reduces it to 7."
Did you know?
“The most common password for a computer and social media platforms is 123456."
Did you know?
“There are eight varieties of computers: mainframe, supercomputer, workstation, personal computer, Apple Macintosh, laptop, tablet, and smartphone."
Did you know?
“Linux leads the industry as it is used by Google, Facebook, Twitter, and Amazon."
Did you know?
“NASA computers were hijacked by a 15-year-old, resulting in a 21-day halt."
Did you know?
“You may heat a room with Gaming PCs more effectively than a heater."
Did you know?
“Physical money accounts for just around 10% of global cash, while the rest is stored on computers."
Did you know?
“YouTube actually started as a dating website." (Oh crap xD)
Did you know?
“Before they could progress as stable brands, Microsoft, HP, and Apple began manufacturing computers in their Garages."
Did you know?
“For every 12 million email spams, only one gets a reply."
Did you know?
“Banks and other corporate giants hire white hats or “good hackers” to help fix security issues and prevent system infiltration."
Did you know?
“If Earth stopped rotating for 1 second, everyone would die."
Did you know?
“If someone made a sound of 1100db or larger a black hole would form sucking in our whole solar system."
“People shouldn't be afraid of their government. Governments should be afraid of their people.”
--V for Vendetta
“Behind this mask there is more than just flesh. Beneath this mask there is an idea... and ideas are bulletproof.”
--V for Vendetta
“You wear a mask for so long, you forget who you were beneath it.”
--V for Vendetta
“Never underestimate the determination of a kid who is time-rich and cash-poor.”
― Cory Doctorow
"Tell me and I forget, teach me and I may remember, involve me and I learn.” – Benjamin Franklin"