Theft and protection of icq wines

If you want 8-digit uin ... Although not. Perhaps 7-digit ... or 6-t ;-) In general, if the number is not important, but only the number of signs in the room is important, this is the most real way.

Below there is an instruction for hacking a certain uin, but I say at once that this is practically not realistic. For hacking a heap of uins passes through the prince of detecting suckers and the same passwords ;-) But a certain uin ... Generally think, but it's better not to waste time.

If you want the instruction in one line, then here: Take V-ListMakeR, IPDBrute and MultiPasswordChanger and then count the number of hacked asya ;-) And if you need more details then read below.



I. V-ListMaker

This program we need in order to generate, reduce, format yuiny / passes in large packs. Very large :) .
1. First, I advise you to start the program and on the first tab GeneratoR (it is by default) in the window Uinz near the field 'mask' write '777 ****' (without the quotes).
2. Lower, where 'count' is set to 7-7.
3. Click on the 'Generate' button. Enter the name of the file in which it will save us a list of usines, press enter and wait. Usually a little less than a minute.
Result: we get all the junks from 7770000 to 7779999.
4. Create a file with passwords. Just a txt file, in which we write, for example, the following lines:
Password
12345
Qwerty
5. Go to the JoineR tab.
6. Click Load Uins File. We select our file, created in paragraph 3, with the yuans.
7. Click Load Pass File. Choose our file created in paragraph 4 with passwords.
8. Click on 'Save Result To ...' and enter the file name, type ser1.txt (type series 1).
9. Click Start and wait until the lazy slider crawls to the finish line. (The program works well, generates in a separate thread, so Mona do her own business while generating no brakes).
10. To close the mug in the upper right corner :) .

Result: we have a file with a view
7770000; password
7770000; 12345
7770000; qwerty
7770001; password
And so on to the end ;-)

Now our file of the Uin; pass type is ready, and now we'll put it ipdbrut'u.



II. IPDBrute

... was created specifically for hijacking asya.

1. Start the program, click 'Config'
2. Source ... - There you specify the path to our wonderful file ser1.txt.
3. Dump INcorrect ... - Bad passes will fall into this file. (I advise before each launch of ipd to clear this matter, at start it slows its current.)
4. Dump CORRECT ... - in this file, if you are lucky, a dozen or a dozen will fall.
In Sections 3 and 4, I advise you not to change the names of the files (good and bad), the current should be assigned to them the full path.
5. Threads - flows. Depends on the number of proxies (about this later), that is, if you have 100 proxies, then more than 200 threads should not be put. For example, for dial-up, 80 threads are enough. For vydelinki you can and once in ten more, but also proxy servers will need much more.
6. Proxies - Proxy. Files proksey mona nadybat everywhere, a special speed of proxies is not required, but, of course, the faster, the better. A particularly lazy list of proxies can be found on this site in the 'Proxy List' section.
7. Bird 'Clean up every ... minutes'. When you run IPDBrute, it shows you 'Proxies: 0, good: 0, alive: 0', so alive is the number of working proxies. To which he managed to reach. In order for it to drain on non-working proks and make the bird 'CleanUp'. Those. Every n minutes it will clear the list of proxies, and leave only the workers.
8. Click OK, and in the program 'Start'. That's all. And we leave this business to work. Every couple of hours you can come up and admire (upset) the results (the absence of these :) ).
Result: yes or no :) .
Then read those who have YES, who do NOT repeat points I-II (do not forget to change the pass :) ) Until the results are achieved.



III. ICQ MultiPassword Changer.

... quickly change the User Details
!!! WARNING !!!
With a mass change of parts, you lose everything that you have typed. The wines simply freeze. Therefore, nefik generally change the details. We went in, changed the password and e-mail. And calm down. That's all. But special perverts can continue to read ...

1. Once and for all we write in infu (Name, Surname, Nick, Soap (it does not immediately become a primak (although sometimes there are glitches), but make mona afterwards) and password (I advise you to change each pack of yuinov).
2. I advise you not to touch the 'Settings' button, there is no niche there :) . (Only if you have option 5)
3. Click Load Uins, select the file good.txt.
4. We press the start and look carefully into the logs. If there appears after each attempt a gray inscription 'Pass & Detalies changed', then everything is ok.
5. If the other, then after the end, start with the first unchanged entry (to start with some specific record (yuin), just click on the list once on it and click start). And so on, until everything changes (usually I do not change at once for 5-6 passes.) To avoid these complicated frauds, go to Settings and set the Timeout twice more than now (not 10,000, but 20,000 or 30,000).
6. And do not forget to share with our site. He helped you, so you help him. So a piece of hacked asay sent to the forum.



Additional information to improve results

1. You can crack using the most common passwords. Because the lamers were, the lamers are eating and will eat ;-) For especially one-time ones, I explain that easy passwords are: password, qwerty, 12312312, 123456, mypass, etc ...
2. Special perverts, who have a free trial, you can use dictionaries. Then of course the possibility of hacking increases several times, but if not one password does not fit you will lose a lot of time.
3. IPDBrute loads a lot of traffic. Therefore, we use it carefully and not at work, so that the chief then pushes the magic pendules ;-)
4. If you see ipd showing 'passwords .... good: 1' or 2 or more, it does not matter, do not cut it with 3 fingers. Why? It's simple. The program could not yet write good passes to the file, and if it is stopped not with the 'Stop' button but with 3 fingers, it will not record :) . And you will remain without passes. So if you still decided to hack, look at the file good.txt, its size and estimate, it corresponds to the number of passwords. (One six-digit with a pass of 5-8 characters takes 12-15 bytes). If everything is ok, chop off tightly.