mailbox cracking (Algorithm)The idea of writing this article arose in the light of recent active discussions in the portal forum of problems related to mailbox hacking; their methods and approaches.
So, what do we understand by the term “social engineering” (hereafter SI). In a general sense, SI is a part of social psychology aimed at changing a person’s behavior under the influence of artificially created factors. We will consider it in this article as a non-technical method of hacking, which relies on the identification of all sorts of information about the victim. I will make a reservation that by the term “mailbox hacking” we will mean changing the password, not identifying it. Our goal in this case is the impossibility of further use of the box by the victim.
Let's start. “With what?” - ask you a question. With the collection of information, of course. After all, in the end, the entire SI relies on the amount, accuracy and reliability of information about the victim. Not unimportant and methods of collecting this information. We need to find out the information we are interested in so that the person who is in the center of our attention does not notice anything suspicious and tells us about his secrets, such as the new disc.
What are the sources of information about a person?
The first source is his website / page, on which in most cases we can see the victim’s autobiography, learn about his hobbies and passions. Also on most of these pages there are all sorts of coordinates for communication: phone number, address (rarely), e-mail (always), ICQ, etc.
The second source is a chat / forum where the victim is / often happens. In the chat you can get to know him, I use several nicknames. It is advisable to use the nicknames of both female and male. See how the victim behaves when dealing with the opposite sex. It is no secret that a person talking to the opposite sex can tell a lot more ...
The third source is ICQ. First, we can learn a lot from the information left about us. Secondly, ICQ is the same chat, only fewer witnesses, which means that a person can be “revealed” completely.
Having studied all these sources, we recognize a person from all sides, so to speak. Now we aim at the mailbox itself. To begin with, we will try to extract the probable password to the victim's box from the collected data. Remember: induction, deduction ...
Didn't work out? Well, do not get upset. The next option is the answer to the password question. Here the scope of our study is narrowed. From all the information received about the victim is not so difficult to figure out for example “Your favorite dish” ...
The main thing is to think, think and think again. After all, with such simple things begins the path to hackers )).