I just had to post this cause its the same damn thing that everyone asks in every comment on every post about hacking, “How do I hack a free hosted email account like gmail or hotmail?? Please do it for me!” I don’t email people scripts or code and I never will, that would be retarded and wreck-less.
To start, you are going to need to be a member of the milw0rm forums, cause that is where the info is, so go there and sign up if you aren’t a member already. Next, you must understand that there is no real way to “hack” into a free email account like gMail or Hotmail or any other web based email client. There is no code created by a magical unicorn that will just open up a rabbit hole into any web based service. Long ago there were some methods to do what you think you want to do, but the net has grown alot smarter by now, so you are SOL and JWF for those golden days.
The method by which “Black Hat” hackers obtain login information for pretty much any web based service is by “phishing”. Phishing is when someone puts up a page that looks identical to the page that the target or targets are trying to login to. This page then logs the “user name” and “password” to a remote file where the “hacker” can then retrieve that information. Phishing, is what you are about to learn about and or maybe, if your strong enough ;), actually LEARN how to ACTUALLY do.
insanity Posted this code over at the milw0rm forums which I made into a file to download:
You can find some basic instructions on the Fake Gmail login page thread. Its pretty simple, all the code is there or out there somewhere, so I am going to leave it to you to seek out this knowledge instead of just
Also, in the same forum I found a link to www.darkers.com.br which had this MSN messenger redirect Fake Login file by Whit3_Sh4rk:
With this description which I had to translate from Portuguese so its a bit spotty:
Fake MSN serves you to obtain MSN passwords, when executing it it will close the MSN Messenger and will open a false screen of login, when the data will be typed and when the person to try to enter, the data will be sent for the URL configured in the edition, and will be recorded in the text archive. Obs: In some cases she is necessary to place permission in the archive so that it can be written (write), this easily is configured with a ftp customer, so that the data are recorded. By Whit3_Sh4rk
And that’s all I have to say about that. Hope this keeps you from getting bored.*
Note: If you are going to use insanity’s code or Whit3_Sh4rk’s file you better give credit where credit is due. DO NOT RIP, JACK, POST or otherwise go around saying this is your own code this as your own.
* WARNING: This web log, THEMOSTBORINGBLOGINTHEWORLD, this post and all its contents are for educational purposes ONLY. Please note that it is ILLEGAL to obtain any personal information or to break into any information system, other than your own, by any means of “hacking” for any purpose. All those who read the contents of this post and or “web log” tacitly agree to the following. THEMOSTBORINGBLOGINTHEWORLD will not be held responsible for anyone’s actions outside of reading this post or any other information in this blog. All downloads posted are USE AT YOUR OWN RISK and THEMOSTBORINGBLOGINTHEWORLD is not responsible for any problems, either legal or technical, that may occur from anyone’s use of or downloading of the files posted herein. The EDUCATIONAL status of this post and or web log (aka blog) removes any responsibility from the owners, administrators or writers for THEMOSTBORINGBLOGINTHEWORLD that might be otherwise implicit if this warning was not furnished.