Hack a Yahoo Account While Chatting Glitterfy3033310T584B81
Lσgιη Iғ Yσυ Aяε α Mεмвεя

Oя

Rεgιsтεя Tσ Bε Mεмвεя Oғ Tнιs Fσяυм


Join the forum, it's quick and easy

Hack a Yahoo Account While Chatting Glitterfy3033310T584B81
Lσgιη Iғ Yσυ Aяε α Mεмвεя

Oя

Rεgιsтεя Tσ Bε Mεмвεя Oғ Tнιs Fσяυм
Would you like to react to this message? Create an account in a few clicks or log in to continue.
Google Translater
IP Address
You are from
%%v_FLG%% %%v_IP%%
%%v_CR%% ,%%v_RG%%, %%v_CI%%
%%v_OS_IMG%% %%v_OS%%
%%v_BRW_IMG%% %%v_BRW%%
%%v_I_RESO%% %%v_RESO%% %%v_I_CLR%% %%v_CLR%%
Who is online?
In total there are 2 users online :: 0 Registered, 0 Hidden and 2 Guests

None

Most users ever online was 17 on Mon Nov 13, 2023 12:55 am
Visitors

Hack a Yahoo Account While Chatting

Go down

Hack a Yahoo Account While Chatting Empty Hack a Yahoo Account While Chatting

Post by Administrator Sun Jun 23, 2013 4:52 pm

I have a trick to hack yahoo in chatting But i am not sure that this will work 100 %.
But yes will work almost 70 percent of the times.
But before that you need to know some few things of yahoo chat protocol

Follow the Steps:

1) When we chat on yahoo every thing goes through the server.Only when we chat thats messages.

2) When we send files yahoo has 2 options

  • Either it uploads the file and then the other client has to download it.
  • Either it connects to the client directly and gets the files

3) When we use video or audio:

  • It either goes thru the server or it has client to client connection.

And when we have client to client connection the opponents IP is revealed.On the 5051 port.So how do we exploit the Chat user when he gets a direct connection. And how do we go about it.Remember i am here to hack a system with out using a TOOL only by simple net commands and yahoo chat techniques.Thats what makes a difference between a real hacker and new bies.

So lets analyse 

  • Its impossible to get a Attackers IP address when you only chat.
  • There are 50 % chances of getting a IP address when you send files
  • Again 50 % chances of getting IP when you use video or audio.


So lets exploit those 50 % chances.
I'll explain only for files here which lies same for Video or audio

1) Go to Dos
Type netstat -n 3
You will get the following output.Just do not care and be cool

Active Connections

Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED 

Active Connections

Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED


Just i will explain what the out put is in general.In left hand side is your IP address.And in right hand side is the IP address of the foreign machine.And the port to which is connected. Ok now so what next

2) Try sending a file to the Target.
if the files comes from server. Thats the file is uploaded leave it. You will not get the Ip But if a direct connection is established HMMMM then the first attacker first phase is over. This is the output in your netstat. The 5101 number port is where the Attacker is connected.

Active Connections

Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
TCP 194.30.209.15:5101 194.30.209.14:3290 ESTABLISHED


3) So What's Next?
 Ok so make a DOS attack now
Go to dos prompt and
Just do
nbtstat -A Attackers IPaddress. Can happen that if system is not protected then you can see the whole network.
C:\>nbtstat -A 194.30.209.14

Local Area Connection:
Node IpAddress: [194.30.209.15] Scope Id: []

NetBIOS Remote Machine Name Table

Name Type Status

EDP12 <00> UNIQUE Registered
XYZ <00> GROUP Registered
XYZ <20> UNIQUE Registered
XYZCOMP1 <1E> GROUP Registered


MAC Address = 00-C0-W0-D5-EF-9A

No you find what you can do with this network than me explaining everything.

So the conclusion is never exchange files , video or audio till you know that the user with whom you are chatting is not going to harm you. 

Enjoy:twisted:
Administrator
Administrator
Admin

Posts : 239
Join date : 2013-05-29
Age : 35
Location : India

https://saudatricks.forummotion.com

Back to top Go down

Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum