This post is by a banned member (Minux666) - Unhide
21 May, 2020 - 12:02 PM
Reply
this is really useful thank you
This post is by a banned member (anihtmi) - Unhide
21 June, 2021 - 09:23 PM
Reply
(06 August, 2018 - 02:58 PM)Lily Wrote: Show MoreBe sure to leave a like after reading it, I spend 1 hour to write this and source individual information.
Hi, looking to get start cracking for your first time? Look no where else, read this first. The little basics.
What is cracking?
Show ContentSpoiler:
Cracking or another term as credential stuffing is a type of cyberattack where stolen account credentials typically consisting of lists of usernames and/or email addresses and the corresponding passwords (often from a data breach) are used to gain unauthorized access to user accounts through large-scale automated login requests directed against a web application(usually on an application) like sentry mba.
Types of account credential?
Show ContentSpoiler:
When we talk about credential stuffing, we need one kind of thing to make it work. We call them "Combo-list".
They consist of list of username/password or email:password combination. Below is an example.
Credential list example:
Show ContentSpoiler:
crackedexample:12345678 (username:password) format
[email protected]:12345678 (email:password) format
How credential are obtain?
Show ContentSpoiler:
They are obtainable through a process called SQL Injection. It's a code injection technique to gain administrator access for databases. It works by extracting information like emails/username/password. But, it only works on site that are vulnerable for such attack.
How is the credential extracted?
Show ContentSpoiler:
You should have heard of SQLi Dumper and other tools similarly to these. SQLi Dumper is an application that uses dorks to find sites and later on finding vulnerabilities in those sites and perform an SQL Injection on them, allowing you to extract the database.
Type of application?
Show ContentSpoiler:
Commonly used and found are Sentry MBA, and other made software tools like SNIPR/BlackBullet/Standalone Checker.
Commonly used for Email Access are AIO/Woxy/Mailflow.
Usage
Show ContentSpoiler:
Combos - Combos are found extracted on site with SQL Injection attack and mostly on vulnerable site as such. The password may be hashed encrypted in sha or md5 thus requiring you to de-hashed them.
Web Application - SNIPR/STORM/SENTRYMBA typically use to acquire account from the credential list from breach site.
Storm:https://stormapp.org/
SNIPR/CRACKED:https://snipr.gg/ / Cracked version can found on this forum.
Proxy - Public Proxies(Low Quality) / Premium Paid Public List(Medium Quality) / Private Sources(High Quality)
Storm:
- Download configuration file, https://cracked.to/Forum-Configs--82
- Drag the configuration file and place it on the config folder, the same folder as storm.
- Run Storm
- Load your credential list
- Load your proxy
- Set the required thread based on the config, and start running
SNIPR:
- Open up SNIPR.exe if you're using the paid version if not open up SNIPR Local.exe if you're using the cracked one.
- Tick the configuration module you like
- Choose the type of proxy you're using, HTTP/s or Socks 5 or Socks 4.
- Choose the thread, recommend 150. Max 500
- Load the credential list and it will start the checking right away.
PROXY:
Show ContentSpoiler:
First off from your first time of cracking, I would not highly recommend you to get a private proxy source right away.
Type of Proxy?
Show ContentSpoiler:
Public proxy - free and can be found everywhere and they don't last long cause they're shared with everyone.
Paid public - proxies are constantly updated by verifying proxy ratio found on various sources. They last quite awhile and all of them have the speed of below 300ms 80% of them un-comparable to free public list.
Private proxy - No explain is needed here, high-quality.
Public Proxy:
Recommended you to use gatherproxy scrapper.
Paid Public List(CHEAP):
- https://proxy-grabber.com/premiumproxy.php
- https://good-proxies.ru/
- http://premium.freeproxy.ru/
- https://premproxy.com/
- https://proxies24.com/
- https://hide.services/
- http://cmproxy.ru/
- https://top-proxies.ru/
- http://own24.ru/
Private Source:
- http://stormproxies.com/
- https://starproxies.com/
- https://www.proxyrack.com/
- http://www.vip72.com/
- https://rsocks.net/
- https://buy.fineproxy.org/eng/
- https://moxyproxy.pw/
- https://exproxy.ru/
List of good site to start cracking on without the need of good quality proxies :
- Hulu
- Spotify
- Minecraft
- ExpressVPN
- Fitbit
- Crunchyroll
- Deezer
- Tidal
Email Access:
Show ContentSpoiler:
Email access are email accessible account that is acquire on a email-checker tools like AIO/Woxy/MailFlow etc. N ot only you have access to the account on the website, but you can also login to the email. This usually boosts the value of the account by a significant amount. Download thunderbird, https://www.thunderbird.net/en-US/. An essential tool for email accessible account. It can almost login with any domain
Profits?
Show ContentSpoiler:
There is many and various way of earning money through cracking. Let's say you can sell some VPN Account/Spotify/Netflix or anything you like on ecommerce site or forums. But, selling of runescape golds are even better.
What to do with the profits you earn?
Show ContentSpoiler:
Do whatever you like. Supporting your own family ? Pretty much I'll say don't stop learning. Keep going.
sheesh
This post is by a banned member (swaggyp1) - Unhide
16 October, 2021 - 10:26 PM
Reply
This post is by a banned member (skiprroxy) - Unhide
11 September, 2024 - 06:35 PM
Reply
|