Skip to main content

Hacking Hotmail / MSN Accounts

Hacking Hotmail


Introduction

We all use Hotmail!!!well its one of my Favorites.

Here m going to reveal n Alert About how the Unethical Hackers Can cheat us.

This Page is meant for Educational Purpose only. I do not Endorse Hacking at all but its Meant for knowing the Threats n Protect yourself also Curbing them

Topics

1:- How hotmail can be hacked with fake login screen (2 different ways)

2:- Fake e-mails threats

3:- Detect a fake message into hotmail

4:- How to get persons ip address through msn messenger

5:- curbing the way hackers get the passwords

6:- Easiest Way

7:- Change msn messenger title

8:- Protect yourself from Virus

9:- Hoax Toolbox v1.1

1) Protect yourself from Phishing

Usually The Unethical Hackers Upload their hotmail's fake login screen on a web server and then send these codes

to the victim from yahoo or another mail sending program. The codes are

< script>

location.href="http://www.yoursite.com/yourhotmailfakepage.html\/"

< /script>



and the user will be automatically redirected to your fake hotmail screen from their e-mail box & you r Hacked.

Beware of There Threats

2) Beware of Fake Login Screens

They Start chatting with your victim and send him the fake login screen through Their messenger and try to pish you.

there are many many of them available on the net.. which are usually small Visual Basic programs.. never reveal your password anywhere other than the latest Versions of msn Messengers.

3) Fake e-mails threats

This is very easy go to http://www.boxfrog.com/ register( its blocked now) but there are many others .. google u ll find many click on create message and in from filed type in any ones e-mail address and the message will be sent.

there's also a simple way of doing this by Telnet ting from the dos Prompt.

Beware of this Threat .. make your spam protection Powerful

4) Detect a fake message into Hotmail inbox

This is Simple Buddies.. open your e-mail box go to options select display setting or message display setting or (some thing like this) now select full where it says message display settings or something like this. Open the mail which u thought to be fake now in the last where it says from u can see the address of that site from where the mail is sent but if some one has sent it through some sort of program it will tell u his ip. n once you know D ip m sure u know how to go between it there after

IMP: Read the ip address log from Backwards.

5) Protect urself revealing your ip address through msn messenger

When you Open your messenger start chatting with friend open ms dos and type netstat -n there do not press enter and then minimize it after this send something to your victim and as soon as he accept it the hotmail messenger will say connecting this is the time when u re maximize your MS-DOS and

press enter the ip address next to time wait: will the friends ip. U may be Hacked The same way



Beware!!

HoaX Toolbox v1.1

This is a PHP script that creates a website with an admin area that allows the user to choose between fake login pages of MSN Messenger, Hotmail, Yahoo and Google Mail, once you set up the script on a server that has PHP and SQL you will be able to log in the administration page and choose the fake login page to display to the main site, when the victim tries to log-in their mail/messenger, the website keeps the user/pass information in a log file that you can view anytime from the admin area, if the victim is not stupid enough to add their real log-in because they read the URL of your server instead of reading hotmail.com or yahoo.com in the URL bar then remember you can pop-up the main page of the site and disable the URL bar on the explorer, so when the user clicks on your real site the link "Yahoo Mail" an explorer without URL bar pops up, if you don't know how to pop up customized browsers search google

Hacking MSN

Small yet working trick

Hacking MSN is actually VERY simple. Msn is designed to route the connection through a Microsoft server while you are chatting. However, when a file is sent, a DCC (direct connection) is created. This was purposely done because otherwise Microsoft would waste a lot of bandwidth so a direct connection is made. This is your chance. Make a file transfer occur between u and a victim (try to send a big file), open up your command prompt (run "cmd" in NT/XP or "command" in 9X to get into prompt) and run netstat. usually the MSN targets IP would be above port 2000. enjoy.

If u receive some crap like gux1-43.primus.com as the target, do a reverse DNS lookup on it. However, this occurs very rarely, mostly u will receive a clear IP.

Once u have d IP u can do anything with him by Fingerprinting.

U can protect yourself from this occurring to you by using a proxy with MSN (under connections panel in options).

Comments

Popular posts from this blog

Email On Deck: A disposable email address that works

Today, Team Inforpioneer brings an interesting Email service for our reader which will definitely help our readers to improve their internet security and will benefit in some other ways.  Here is a short description of this service.  EmailOnDeck.com is the premier site for all things relating to temporary, disposable and throwaway email addresses. We want to help you avoid SPAM, protect your online privacy, and stop you from having to give away your personal email address to every company and person on the internet who insists on you giving it to them. We work hard and will continue to work hard to give you a disposable email address that works with any site or app. We hope to help give you back the control of deciding who you want to give your personal info to. Temporary emails are perfect for any transaction where you want to improve your online privacy. Use them when you buy or sell Bitcoins or trade cryptocurrency, at exchanges, or locally. They can be used for QA testing of e

Top 101 Ways to Promote a New Blog

Promoting a new blog can be quite daunting, but it doesn’t have to be. As you might expect, breaking down blog promotion into small, actionable tasks eliminates the mental road block you’ve probably experienced when trying to wrap you head around how to get people’s attention. You don’t have to do everything in this list, and some items will have a greater effect then others, but every tactic will at least drive some traffic, and any traffic is better than no traffic. Content 1. Write a list of over 100+ resources or ideas. 2. Write the definitive guide to something. Spend time making this awesome. 3. Release a manifesto . 4. Release 2 manifestos . 5. Interview cool people. People like talking about cool people. 6. After your articles are indexed in search engines, break them up into smaller articles and submit them to ezinearticles.com (and other article directories). 7. Or just pay someone to submit the articles for you . 8. Write a list of all the cool blogs and people in your nich

Cell Phone Buying Guide 2010

I outline some of the most important factors to look into when purchasing a new cell phone. When your old cell phone squeaks like a rusty door hinge, has more lint under the screen than your jean pockets, and lasts half an afternoon with a full charge, it’s time for a new one. But with most cell phone contracts lasting two years, a new phone shouldn’t be the type of purchase you make lightly. Check out our quick and dirty guide to your next phone purchase to make sure you cover all the bases on your shopping trip. Choosing a carrier Because most U.S. cell phone carriers heavily subsidize phone purchases in exchange for two-year contracts, and lock the phones to their networks, your choice of cell carrier will have more impact on which type of phone you end up with than any other factor. If you already have carrier and feel satisfied with it, the choice is easy. If not, you’ll need to choose one. AT&T, T-Mobile, Sprint, and Verizon dominate the cell phone market in the States. Speak