hijacking and protection of icq winesIf you want an 8-digit uin ... But no. Perhaps the 7-digit ... Or 6 ;-) In general, if the number is not important, and only the number of characters in the number is important, then this is the most realistic way.
Below there is an instruction for hacking a certain Uina, but I say at once that it is practically unreal. For hacking a heap of wines passes according to the principle of detecting suckers and the same passwords ;-) And here is a certain win ... Actually think, but it's better not to waste time.
If you want the instruction in one line, here: Take the V-ListMakeR, IPDBrute and MultiPasswordChanger and then count the number of cracked asyas ;-) And if necessary, read more below.
I. V-ListMakerThis program we need in order to generate, reduce, format yuiny / passes in large packs. Very large .
1. First, I advise you to run the program and on the first tab of the GeneratoR (it is by default) in the Uinz window near the 'mask' field write '777 ****' (without quotes).
2. Below, where 'count' is set to interval 7-7.
3. Click on the button 'Generate'. Enter the name of the file in which it will save us the list of uins, press enter and wait. Usually a little less than a minute.
Result: we get all yuiny from 7770000 to 7779999.
4. Create a password file. Just a txt file in which we write, for example, the following lines:
5. Go to the JoineR tab.
6. Click Load Uins File. Choose our file generated in paragraph 3 with yinami.
7. Click Load Pass File. Select our password file created in step 4.
8. Click on 'Save Result To ...' and enter the file name, type ser1.txt (type series 1).
9. Click Start and wait until the lazy slider crawls to the finish. (the program works well, it generates in a separate thread, so Mona is doing her own business while generating without any brakes).
10. Prog mona close the circle in the upper right corner .
Result: we have a file with a view
and so on to the end ;-)
Now our file of the form Uin; pass is ready, and now we will thrust it to ipdbrut'u.
Ii. IPDBrute... created specifically for hijacking asya.
1. Run the program, click 'Config'
2. Source ... - There you specify the path in our wonderful file ser1.txt.
3. Dump INcorrect ... - bad passes will be dumped into this file. (I advise you to clear this case before each launch of ipd, since it starts up its current braking at the start.)
4. Dump CORRECT ... - In this file, if you are lucky, it will be five-dozen GOOD ones.
In paragraphs 3 and 4, I advise you not to change the file names (good and bad), the current should be given the full path to them.
5. Threads - threads. It depends on the number of proxies (more on that later), that is, if you have 100 proxies, then you should not put more than 200 threads. For example, for dial-up 80 threads are quite enough. It is possible to do it ten times more, but the proxy servers will need much more.
6. Proxies - Proxy. Mona proxy files are everywhere, special proxy speed is not required here, but of course, the faster, the better. A particularly lazy list of proxies can be found on this site in the 'Proxy list' section.
7. Bird 'Clean up every ... minutes'. When you start IPDBrute, it shows you 'Proxies: 0, good: 0, alive: 0', and so alive is the number of working proxies. to which he managed to reach out. In order for it to drain on the non-working proxies and the 'CleanUp' bird is made. Those. every n minutes it will clear the list of proxies, and leave only the workers.
8. Click OK, and in the program 'Start'. That's all. And leave this thing to work. Every couple of hours you can come up and admire (grieve) the results (the lack of ).
Result: yes or no .
Then read those who have YES, those who have NO repeat points I-II (do not forget to change the pass ) until results are achieved.
III. ICQ MultiPassword Changer.... quick change User Details
!!! WARNING !!!
With a massive change of parts, you will lose everything that you have screwed up. Uiny simply freeze. Therefore, nefik generally change the details. We went, changed the password and e-mail. And take it easy. That's all. But special perverts can continue to read ...
1. Once and for all we enter the info (First Name, Last Name, Nick, Soap (it doesn’t immediately become a primacum (although sometimes there are glitches), but make a mona afterwards) and a password (I advise you to change it for each pack of units).
2. I advise you not to touch the 'Settings' button, there’s nothing interesting there . (only if you have option 5)
3. Click Load Uins, select the file good.txt.
4. Click Start and look carefully at the logs. If the gray sign 'Pass & Detalies changed' appears after each attempt, then everything is ok.
5. If it is different, then after the end we start with the first non-replaced record (to start with some specific record (yuin), just click on it once in the list and press start). And so we do until everything changes (usually, I have 5-6 passes 1 immediately does not change. To avoid these complex frauds, go to Settings and set the Timeout twice as much as it is now (not 10,000, but 20,000 or 30,000).
6. And do not forget to share with our site. After all, he helped you, and you help him. So a piece from the hacked asya is sent to the forum.
Additional information to improve results.1. You can hack using the most basic passwords. Because the lamers were, the lamers eat and will eat ;-) For especially unmarked ones, I explain that the easy passwords are: password, qwerty, 12312312, 123456, mypass, etc ...
2. You can use dictionaries for special perverts who have free downloads. Then of course the possibility of hacking increases several times, but if more than one password does not work, you will lose a lot of time.
3. IPDBrute eats a lot of traffic. Therefore, we use it neatly and not at work, so that later the chef will press on the magic pendyuley ;-)
4. If you see ipd shows 'passwords .... good: 1' or 2 or more, it does not matter, you should not chop it with 3 fingers. Why? It's simple. The program could still not write good passes to the file, and if you stop it not with the 'Stop' button, but with 3 fingers, it will not record . And you will be without passes. Therefore, if you still decide to chop, look at the file good.txt, size it and think for it, it corresponds to the number of passwords. (one six-pointer with a pass of 5-8 characters takes 12-15 bytes). If everything is ok, chop it tightly.