This page has been robot translated, sorry for typos if any. Original content here.

We break the soap, use BrutusAET2


And so, I want to tell you: how to steal a soap (e-mail) with the help of BrutusAET2.

Let's start.

We will need :

1) The program for brute force passwords BrutusAET2, which can be downloaded from here:

2) Dictionaries, which can be taken from here:

3) Straight arms.

For example, I will result in the hijacking of a soap box at @

Configuring the program for brute force passwords BrutusAET2:

1) Have opened the program.
2) In the Target field we write
3) In the Type field, select POP3

Connection Options:

1) Port we put 110.
2) Connections set to a maximum of 60.
3) Timeout put on a maximum ie 60

POP3 options:
Do not touch =)

Authentication options:

If we want to block the list of mnogolnikov , then we need to create a textbox, let's call it users.txt, there we throw users lists.
For example:

We climb in the program there put a tick near Username.

Use Username: specify the path to the list of users.

Let's move on to the password list ...
We create a textwriter words.txt and then we shove passwords.
For example:

We climb into the prog and choose

Pass mode : Word list
Pass file : specify the path to the password list.

It's just as easy to break the soap with just put it in Target: and the rest is the same.

In general, everything should look like in the screenshot:
Hacking Mails

some useful links from me ...

Hashi: decrypt passwords
"Press once to show the spoiler - click again to hide ..."

"Press once to show the spoiler - click again to hide ..."

links !!! All references to the world !!!

================================================== ======================

methods for finding passwords for beginners

Method number 1. "Brutus" / long /

The first method we will have brute (Brute Force) - a method of full search.
What you need:
1. The program for busting BrutusA2 (WWWHack or similar)
2.Knat the address of incoming mail (pop3) of the mail service. This address can be found in the help or faq sections on the mailer's website.
3. The passwords list (Passwords List) is also desirable
Pros: the password will always fit! (if not in the dictionary, then a complete search)
Cons: to get it guaranteed - it may take several millennia or millions of years.
Since busting is the longest way, and in order to cut it somehow, it is necessary:
a. Go and register yourself a box on the postal service that you will be crooking. When registering, pay attention to the "Password" field. Your task is to learn the requirements of the mail service to the minimum and maximum length of the password, and the symbols used (next to the field it is usually written).
b. Open the password dictionary (I prefer Raptor for such purposes), sort the dictionary by the length of the password (from shorter to longer), delete passwords that do not fit the requirements of the mail service in length, and with forbidden characters.
c. Use data from the "Collection of information" method (see below)
Help for those who do not have the Internet:
Brute Force (Conversation: Brutus Translation: Brute Force) - password selection by brute force. Example for "Direct bust":

Example for browse "By dictionary":
Those. since many people use meaningful and easily remembered words to remember the password, why do we need to sort through the characters long, if it is faster to sort through the words?
ps Where what to take (mentioned in the method):
BrutusA2 ->
Raptor ->
pss About passwords that are often chosen - in another, separate, article.

Method number 2. "Collecting information" / requires care /

What you need:
Search Engines:
How to do:
We kill our soap in search and look where it occurs. We go and find everything (where it occurs, on what site, what he wrote and what he asked, when, under what login) we copy and store in a notebook for further analysis.
After that we analyze and make general conclusions about the interests of the person, trying to substitute the password for the found (year of birth, nickname, name, interests, etc.).
To search it is necessary on all search engines as on full soap and only by login my_email
Getting on the Forum (finding his login (nickname)): right-click on the image of his Avatar and look at the path of this image (and suddenly he did not download it to the Forum, but used his lying on his site? (Although he could take someone else's )). Also click on his profile and all that there is - also copy into Notepad (there may be the number of Aska and year of birth, interests, etc.). Do not forget in the profile (if there is) click on the link "Find all user's posts". Carefully read. Maybe there will be some clue (keeping the "Secret Question" in my head). All informative and distinct from "Gyg", "Lol", etc. - in Notepad.
If we find his second soap - we go through the search engines once more.
The same goes for Aska (around the search engines). With ICQ, do not forget to look at [forbidden link]
Also do not forget to look for soap and nickname at
If he has the original nickname - AmSuPerrR, also go for the search engines. Simply if he has a standard nickname - Alex, then you are unlikely to sort out 12 million pages quickly (although - using the syntax of search queries and sorting out "search in the found" you can try).
When you have in your notebook, perhaps a decent list of information, start from it to create a pass-list for this user. And: the year of birth should be tried to substitute in different formats. For example, you found that the year of birth 01.01.2005
Try these options:
Also try the options (where my_email is its login):
his name is 05
To substitute it is simple. Just copied into Notepad "decomposed" according to the words in the column, and try to find each one found several options. And after that you can use the "Brutus"
Also you check the found "second soaps" on the subject whether they exist or not. It may turn out that they were registered long ago, and then the need for them was gone. Then register it on yourself, and try to recover it from the Forum, chat rooms, catalogs, etc.

Method number 3. "Password recovery" / sometimes effective /

How to do:
First, we climb to the postal service and click on the link "Forgot password!" (or similar). We look at what there is a secret question.
For example, if he is "My favorite dish", then the girls can try to substitute the word - ice cream
If the "Year of birth of the grandmother", "Passport number", "Mother's maiden name" - then try 111, 123, 12345, the year of birth of the person whose password is "reminiscent", maybe the answer is the year of registration of soap, well, etc. Since not often there are those who know the year of birth of a grandmother and remember the mother's maiden name. The passport number is more complicated, since some people actually take it and drive it straight. But still try 111, 123 ...
Also you can be great here with the data collected in the "Collection of information" method.

Added (Eco [L] og):
Sometimes a secret question can be like this: 1234567qwerty
Then, in some cases, and the answer to it can be 1234567qwerty
Or similar, typed by the method "on the clave from the bald" (to pick up this will be almost not realistic)

Method number 4. "Recovery from another service" / in a hurry and a password from soap you can take, and the forum / chat /

The whole point is that the password for soap is more difficult to pick up than the password from the Forum, chat, dating service, liv.jurnala, etc. Those. from those places visited or visited by one whose soap is "restored". Hence - we bypass all sites, forums, etc. which fell into our field of vision with the method of "Collection of information." We watch what there, for example, for the Forum and we are already reducing our task to finding vulnerabilities to this Forum (using the same
We have a chance (not great, but there is a chance) that the password from the Forum is suitable for soap as well.

Method number 5. "Trojan" / demanding skill /

The method speaks for itself. The task is to reduce to Trojan's floatation or some kind of Keyloger thread (which you, accordingly, should have), and the expectations from them of reports (logs).
Here for vparivaniya will well help methods "Vulnerability software" and "SI / Social Engineering /"

Method number 6. "Vulnerability of software" / requiring knowledge /

This is probably more of an auxiliary method for the Trojan method. It takes a lot of effort to get Troyan to vparit. But it will be easier if you know the operating vulnerabilities in the software. The same browsers, mail programs (Outlook, TheBat! Etc.), perhaps ICQ. Then your task will be reduced to vparivaniyu links to a thread of your site, when you visit the visitor through a vulnerability in the browser to boot and run Trojan. Or the parcel "hurriedly" formed the letter.

Method number 7. "Vulnerability of mail services" / also requiring knowledge or ability to use the search engine /

The method directly concerns the vulnerability of email services. They sometimes pop up from time to time. Starting from the sending of the message, when viewing the user's browser, which thread settings will change, and until the recent phint with the interception of the password change package of its mailbox, changing its (package) and changing the password to the desired box. Well, etc.

Method number 8. "Have hundreds of rubles, friends will wait" / an invoice. requires a job and a wm-wallet /

You go on okolohakersky site and ask for a fee to "remind" the password. But then be careful when paying, as divorced a lot of thrown (yes that there divorced - they always were).
Never transfer payment by Advance (100% guarantee that the password will be "remembered" by no one (more precisely - some people can give it, but they will be spared when you pay them - before or after. And they, basically, take it after the order is fulfilled .))
As evidence, do not follow that the letter was sent from the box you need.
Also, do not immediately start when the proof is according to the scheme:
You send any letter to the desired box, and then you (after some time) send the text of this letter.
As a protection against a thrown, you can use the scheme "through the Guarantor" or the scheme that is above, but a little tinkered:
1.You agree when you are both online.
2. You are on the "required" to you soap sends out a thread of the text and you should immediately tell what text you sent.
Then at least there is a guarantee that something soap is under control. But with the transfer of money - themselves agree.

Method number 9. "Do not have a hundred rubles, but have a hundred friends" / the ability to make acquaintances /

Just have a good friend (administrator, support, or, better, director) working either to the office where the soap is, or providing a hosting / internet office where soap.
Well, or someone familiar from a thread of the FSB, FAPSI, Office "K" (R) who at risk, will exceed his official authority, find out the password from the support of the postal service and tell you.
This is a very bad and wrong method. And it is practically very rare (and thank God)
Either to have a friend - admin Forum, chat, etc. where the person is sitting. If you are not familiar, nothing hinders you as a thread to meet him ...

Method number 10. "SI / Social Engineering /" / The most accurate method. requires the ability to set a task, analyze. training /

Many of the previously described methods, one way or another, then reduce and intersect with this method. The same thing - this method requires some of the other methods (such as "Collecting information", "Vulnerability of email services," etc.)
This is the most extensive and branched method. Therefore, right now, briefly, and then put in a separate article.
The general sense is to reduce the password from soap directly from the owner. Or you can persuade him to do any actions you need (the same guaranteed launch of Troyan).
Under the "learn directly from the owner" is understood that this same password the owner himself will "tell you". But he does not even understand that he himself did not know it, he gave it to you (and maybe he will, but then).
ps About the SI method and its sub-methods - in the next. article (if there is a desire and interest)

Method number 11. "What for he is so needed?" / a long but relatively simple method /

The essence of the method is to force the owner to abandon the mailbox voluntarily (sometimes it is necessary to "restore" not to read, but to have the right box). And it's easier to do it - just periodically spam this box. If the owner of the box is not too shy how to get rid of such spam, then in a couple of weeks he will get tired of shoveling out of the box or cleaning it from a ton of letters and he will abandon it. And postal services are not rubber. And when there is a limit on the location for the box and when it is not visited, then such a box will eventually be removed.

Well, lastly, the alternative method
Method number 12. "Fear" / criminal /

You catch the master in the doorway ...