FAQ on stealing ICQ, IPDBrute / ICQ Relay Server. INFA. FilesMATERIAL IS PUT FOR SIGNIFICANT PURPOSES. THE AUTHOR IS NOT RESPONSIBLE FOR ANY RESPONSIBILITY
Hijacking asek with the help of Brut is very simple, almost anyone can steal 6 *
For a couple of hours. For this, Brutus himself is needed, this is IPDbrute2 lite and IPDbrute2 Pro, light differs from the fact that there is no change in the number and password in the light, but since often when changing the password, it is lost, I do not advise putting off the option change password enabled and mine You advice, better take light -)
Then you need any sheet pass generator:
UIN; Pass Generator from Swifta
UIN_PASS_v1.8 ot Mxl
UIN-Pass list Creator v.1.5 RC4
there are also many other generators, but I think these are the best, then you take a list of numbers, because we have the task to hijack any 6 digs, then just set any range (example: 200000 to 399999) and come up with any password (I advise you not to put 12345, qwerty and etc.) Next, I will describe an example of working with the swifa generator
In the “By Range” field (left, top), set the required range, below, in the “Password” field (the word “password” is written there, enter your password and press the “Generate” button under your range and save your pass sheet.
Next you need to get a proxy for Brut.
1) You can take on different sites dedicated to proxy services
2) You can download the proxy checker and proxy search program and proxy yourself to get it
3) Buy proxies from sellers
The first option is good because you get a proxy for free, but often it will affect the speed of brute force (Example on a connection of 48 kilobits, with public proxy I squeezed a maximum of 4 pps on Brutus).
The second option is better than the first one, but you need to sweat here, since you will not be able to climb the proxy yourself, you will need time to scan and choose a good range where you can get at least something, but it’s best to take ProxyChecker and tag yourself with fresh proxies, but how and 1 option while the speed will not be so hot.
The third option will very well affect the speed of the Brutus, but then you have to fork out for a certain amount of ye and often not for nothing, so the speed will be better than in public, but it will depend on the seller -)
So I advise you to buy proxies from several people and identify where it is better there to buy.
Here you made a pass of the list and found a proxy, now launching a brute put in the field “-Source uin; pass list file:” the path to your pass list, in the field “Dump passwords to this file:” enter the path to the bad list, that is file with incorrect passwords, in the field “-Dump correct passwords to this file:” enter the path to the good sheet, the file with the selected passwords to numbers.
In the field “-Proxies list file:” enter the path to the file with the proxy. If you do not understand how to register the path, then press the button with "..."
In the “Threads:” field, set the number of threads, for example, the default is 100, the optimal number of threads for your connection you can determine each time I change the number of threads and the number of proxies.
A check mark next to “Cleanup every:” serves to remove bad proxies after a certain period of time. Now click on Star and will appear:
Threads: 0, alive: 0
Passwords remains: 0, bad: 0, good: 0
Proxies: 0, good: 0, alive: 0
Speed: 0.00 PPS
Threads: 0, alive: 0 - Number of Threads
Passwords remains: 0, (number of numbers) bad: 0 (number of "bad" passwords), good: 0 (number of "good" passwords)
Proxies: 0 (total number of proxies), good: 0 (number of good proxies), alive: 0 (number of live proxies)
Speed: 0.00 PPS - Speed brute force per second
Now we wait when in the field:
Passwords emains: 0, bad: 0, good: 0 - 1 appears after the word good, which means you already have one 6 * icq number in your hands.
1) Do not make a too large pass sheet, 1 500 000 will be enough in full
2) It's easier to hijack a number with one password for a certain range than with multiple passwords for one number
3) Do not put a large number of streams, 200-800 will be enough in full
If you have already extracted your first 6 * then enter it in the search and if it is not, then you have an invisible in your hands, which means that the number is 100% safe, you can also check for “invisibility” in Uska 2004
4) And if the number was found by the search, then you need to find out if he has primari, you can find out with the help of Bot
64464644 or go to the addresses
Or you can download the Primari database, you can download it on the websites written above -)
At this point I will finish the description of the extraction of the room with the help of Brut.
All programs you can find on the Internet or download from the sites written above -)
2) To hijack a room with the help of primari, you will need to learn primari from the number, you can find out from point 4 of the “Brutus” section. After you have found a primari from the desired number, then you need to check whether it is busy or not, of course. If you need one number, then it is easy to check primari from one number, and if hundreds or thousands of primari check it manually, it will be very long, but and then came to the aid of people who wrote the "checkers" of the program that checks whether the Primary is free or not. If the public checkers, and there are private ones, the ones that the Author sells and in order to purchase it is necessary to lay out the number of ye, but at the moment the public checkers already have almost everything.
I will not describe the work with the checker, here you will have to preload what is in your head -)
Not only with the help of the checker you can take the number through the Primari, but also if you saw soap (Primari), which is located on a free domain and the Primari retry is (check it at http://icq.com/password/ )
If the activation question goes to soap, then we register the domain first and send the activation and the number will be yours, this method is suitable only when the number is more expensive than 15 ye or the number is your phone number (cell, house, etc.)
About the activation of questions can be found at http://www.de1et.info/pm_faq.html
If you want to register a domain when registering, then you can turn to the card, let it be your card, it will be cheaper than you buy it legally or the domain itself.
That's so briefly about the hijacking of Primari, so do not hit -)
3) Hijacking with the help of Sots Engineering
There are a lot of ways, you can’t list them all, the main thing is to straighten your mind and come up with a thread that is such a thing, from which the person you want to process, got hooked.
The easiest way to push the enemy Troyan, I advise pinch. This is not easy to do, as there are people who are not as gullible as I and the message:
Check out my new flash drive.
Download Inet Crack
The easiest way to fill in on any site is Exploit and Troyan, and to call on that page of your enemy, and if he uses Internet Explorer and your exploit is private, then the number is exactly yours.
I opened my website, it is located at http: //
I found cool pictures on http: //
There are a lot of ways, so we turn on the brain and go ahead
!!! World !!!
IPDbrute 2 PRO SE
UIN / Password Generator by Swift
-------------------------------------------------- -------------------------------------------------- -
ICQ Relay Server
!!! World !!!
ICQ Msg Logger
Storage of ICQ History
The public testing of the service for storing your (and maybe not your) ICQ history opens
In short, what he does:
you add a number in admin panel
register in the client server icqhistory.zloy.org
and your story is saved on the server, you can read it
now by points:
regebat (confer on soap is not completed, so after register we go directly to the link)
create keys (Generate new key)
Download the key (when re-downloading the key to the same file, for some reason, it will be appended, so save it under a different name; if you know how to fix it, write it down)
add uin (Manage uins -> add uin)
writing in the client the server icqhistory.zloy.org.
So say the pros:
+ the whole history of Blowfish is encrypted with a key of 256 bits, the key is encrypted with an asynchronous RSA algorithm with a key length of 1024 bits (why and why - go to Wikipedia)
Ie in simple words: your correspondence cannot be read by anyone else but you
+ all messages are saved (and offline), rtf is correctly processed,
+ passwords are saved
+ It is convenient to read the story if you use Asya in different places (home, office, telephone, Internet cafe)
+ Both connections occur on the same port (that is, in the fire, it is necessary to open for the current 5190)
+ etc. )
What you plan to add:
+ save the date of change of status
+ output history for a certain time
+ download history
+ save transferred files