theft and protection of icq winesIf you want 8-digit uin ... Although not. Perhaps 7-digit ... Or 6-t ;-) In general, if the number is not important, but only the number of characters in the room is important, this is the most realistic way.
Below there is an instruction for hacking a certain uin, but I say right away that this is practically not realistic. For hacking a heap of uinov passes through the prince of detecting suckers and the same passwords ;-) But a certain uin ... Generally think, but it's better not to waste time.
If you want the instruction in one line, then here: Take V-ListMakeR, IPDBrute and MultiPasswordChanger and then count the number of hacked asya ;-) And if you need more details then read below.
I. V-ListMakerThis program we need in order to generate, reduce, format yuiny / passes in large packs. Very large .
1. To start, I advise you to start the program and on the first tab GeneratoR (it is by default) in the window Uinz near the field 'mask' write '777 ****' (without the quotes).
2. Lower, where 'count' is set to interval 7-7.
3. Click on the 'Generate' button. Enter the name of the file into which it will save us a list of the yins, press enter and wait. Usually a little less than a minute.
Result: we get all the junks from 7770000 to 7779999.
4. Create a file with passwords. Just a txt file, in which we write, for example, the following lines:
5. Go to the JoineR tab.
6. Click Load Uins File. We select our file, created in paragraph 3, with the yuans.
7. Click Load Pass File. We select our file created in paragraph 4 with passwords.
8. Click on 'Save Result To ...' and enter the name of the file, type ser1.txt (type series 1).
9. Click Start and wait until the lazy slider crawls to the finish line. (the program works well, generates in a separate thread, so Mona do her own business while generating no brakes).
10. To close the mug in the upper right corner .
Result: we have a file with a view
and so on to the end ;-)
Now our file of the Uin; pass type is ready, and now we'll put it ipdbrut'u.
II. IPDBrute... was created specifically for hijacking asya.
1. Start the program, click 'Config'
2. Source ... - There you specify the path to our wonderful file ser1.txt.
3. Dump INcorrect ... - This file will fall down bad passes. (I advise before every start of ipd to clear this matter, at start it slows its current.)
4. Dump CORRECT ... - in this file, if you are lucky to fall a dozen or a dozen good.
In Sections 3 and 4, I advise you not to change the names of the files (good and bad), the current should be assigned to them the full path.
5. Threads are threads. Depends on the number of proxies (about this later), that is, if you have 100 proxies, then more than 200 threads should not be put. For example, for dial-up, 80 threads are enough. For vydelinki you can and ten times more, but the proxy servers will need much more.
6. Proxies - Proxy. Files proksey mona nadybat everywhere, a special speed of proxies is not required, but, of course, the faster, the better. Especially lazy list of proxies can be taken on this site in the 'List of proxy'.
7. Bird 'Clean up every ... minutes'. When you run IPDBrute, it shows you 'Proxies: 0, good: 0, alive: 0', so alive is the number of working proxies. to which he managed to reach. In order for it to drain on non-working proks and make a bird 'CleanUp'. Those. every n minutes he will clear the list of proxies, and leave only the workers.
8. Click OK, and in the program 'Start'. That's all. And we leave this business to work. Every couple of hours you can come up and admire (upset) the results (the absence of these ).
Result: yes or no .
Then read those who have YES, who do NOT repeat points I-II (do not forget to change the pass ) until the results are achieved.
III. ICQ MultiPassword Changer.... quickly change the User Details
!!! WARNING !!!
With a mass change of parts, you lose everything that you have typed. The Wines just freeze. Therefore, nefik generally change the details. We went in, changed the password and e-mail. And calm down. That's all. But special perverts can continue to read ...
1. Once and for all we write in infu (Name, Surname, Nick, Soap (it does not immediately become a primak (although sometimes there are glitches), but make mona afterwards) and password (I advise you to change it for each pack of yuins).
2. I advise you not to touch the 'Settings' button, there is no niche there . (only if you have option 5)
3. Click Load Uins, select the file good.txt.
4. We press the start and look carefully into the logs. If there appears after each attempt a gray inscription 'Pass & Detalies changed', then everything is ok.
5. If the other, then after the end, start with the first unchanged entry (to start with some specific record (yuin), just click on the list once on it and click start). And so we do it until all is changed (usually, I do not change at once for 5-6 passes.) To avoid these complicated frauds, we go to Settings and set Timeout twice more than now (not 10,000, but 20,000 or 30,000).
6. And do not forget to share with our site. He helped you, so you help him. So a piece of hacked asay sent to the forum.
Additional information to improve results1. You can crack using the most common passwords. Because lamers were, lamers eat and will eat ;-) For especially one-by-one explain that easy passwords are: password, qwerty, 12312312, 123456, mypass, etc ...
2. Special perverts, who have a free trial, you can use dictionaries. Then of course the possibility of hacking increases several times, but if not one password does not fit you will lose a lot of time.
3. IPDBrute loads a lot of traffic. So we use it neatly and not at work, so that the boss then pushes the magic pendules ;-)
4. If you see in ipd, it shows 'passwords .... good: 1' or 2 or more, it does not matter, do not cut it with 3 fingers. Why? It's simple. The program could not yet write good passes to the file, and if it is stopped not with the 'Stop' button but with 3 fingers, it will not record . And you will remain without passes. So if you still decided to hack, look at the file good.txt, its size and estimate, it corresponds to the number of passwords. (one six-digit with a pass of 5-8 characters takes 12-15 bytes). If everything is ok, chop off tightly.