Can you hack Email without proper skills? It turns out to be possible. Thus, brute force is considered the most inefficient and dependent on the accidental luck. However, the services usually block the mailbox after several unsuccessful attempts. The special program can find a matching password by moving different variants. Users share their tastes and preferences themselves in social networks, mentioning their pet nicknames, names of favorite writers and musicians without thinking that these data may be used as a secret answer. It should be added that nowadays the search for information belonging to complete strangers is not a problem for the hackers. If the attacker has some information about the user whose Email is supposed to be hacked, he can try to use it to recover the forgotten password. For example, your mother’s maiden name, your favorite brand of car or your favorite author. Most Email services use secret questions for password recovery. Getting to know your mother’s maiden name.For example, that the mailbox will be locked, and to avoid it, you need to confirm the password. The user receives an Email as if on behalf of the administration of this Email service. A hacker creates a fake login page similar to the service the password to which he wants to get. It is used quite often – and not just to hack Email but in many other cases. This case is a vivid example of how to hack the Email knowing the basic victim’s account information. Since the necessary information (account number, phone number, PIN-code, etc.) had been already received during the previous call, the request did not cause any suspicion. Then he called his Email service customer support on behalf of the account owner and asked for the password recovery. The young hacker contacted the mobile operator, introduced himself as a technical support employee and found out all Brennen’s personal information he needed. It is surprising that an Email of the Head of the Intelligence Agency was hacked by a teenager who hadn’t deep technical knowledge. Hacking of the CIA director Brennan’s Email account has become one of the most clamorous recent scandals. And this is what the vast majority of users exactly do. However, this can only work if passwords are stored in the browser. Just copy the Cookies catalog and analyze it with the passwords search tool. There is a simpler version of how to hack an e-mail, even without special programs. With the help of the password recovery tools (which generally are not detected with antiviruses), the ready-made data can be received immediately. In the first case, a special key logger file will record everything the user is typing (including passwords), and then the logs are emailed to the hacker’s address. Having an opportunity to stay alone with the victim’s computer at least for a short time, the hacker can install a key logger or a password recovery program.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |