Someone you know has a Yahoo account.. and you want the password. Whether you don’t trust your spouse or just looking to do some justice, i’m sure you have your reasons. Yahoo mail is estimated as the world’s largest email provider, and in February, 2008, a Yahoo executive claimed the company served 260 million email users which is very close to Hotmail’s numbers. With that many accounts, there is clearly a demand for hacking into these accounts. I don’t condone anything illegal, but I do believe that information should be freely available on the internet, no matter the subject, and that there are many situations and good reasons for doing so. I leave that up to you to decide.
When it comes to hacking email passwords like Yahoo, there are 2 foolproofmethods to do it. Spying and Phishing. They are both methods of social engineering, or in other words, the target unknowingly gives you their password. The only people that know the password are Yahoo and the target themselves, so who do you think it is easier to get from? While there are other ways to hack a yahoo password, the odds are so low it’s not even funny. If you want to know more about the other non-realistic ways to hack password and why they don’t work, read The Truth about Password Hacking/Cracking.
So, here is how you hack yahoo:
Spying (cost money)
Almost everyone logs into their yahoo account through a computer, usually their own. That means one of the people that DOES know the password is the computer it’s being entered on, but of course this information is not remembered by the computer unless Spy Software has snuck onto it. Getting spy software onto the computer is easy, especially if you have physical access to it. Can you count how many times your computer has gotten a virus or suspicious email? It’s the same thing.
So what’s the best spy software to use?
If you have physical access to the computer, you are practically guaranteed the password. A good program is completely stealthy with a host of features, which I recommend you get AceSpy. It’s an advanced spy software mainly for monitoring your kids or employees silently and discreetly. There are also some free keyloggers out there, but I was unable to find one that was stealthy and they are really feature limited. AceSpy has a host of features such as websites visited, instant messenger chat logs, email recording, and even stores screenshots and a unique surveillance mode feature which records a movie of their actions. This can often be better than just having the Yahoo mail password, as deleted emails and other information can be recovered from the screenshots when you otherwise couldn’t.
If you need to hack someone remotely via the internet, there’s a program from the same company called SniperSpy. The difference between the programs, and this is the really great thing, is that SniperSpy is remotely deployable. That means that you can send it’s module via email or file transfer and it will begin monitoring their computer! All of the data it gathers is stored online and can be accessed via their website which means you won’t have to worry about software that doesn’t install on your computer for some reason – all you need is a web browser and the internet to access the Spy Control Panel. This is the program I used on my girlfriend and I was able to get proof of what I suspected. It’s got the same features as AceSpy plus a ton more, and is so stealthy it bypasses firewalls and antivirus because it’s a commercial product.
Phishing (Fake Login Pages)
Phishing is mostly used on a wider scale to target a large amount of yahoo accounts. For example, the most common way of phishing is done by email where the target receives an email message that appears to have come from Yahoo themselves (it’s actually very easy to forge an email sender). In the message, there is always a story of an issue with your account and it asking you to verify your account at the link below – this is where the hacking happens. The person thinks the link is taking them to the official yahoo website, but most people don’t notice the URL is slightly or even completely different. The target is taken to a yahoo login page that looks authentic, and as soon as they enter their details and hit submit, the password is known to the hacker. Phishing is not legal in any circumstance because you are impersonating yahoo and copywriting their page by creating a fake login, but there is literally no enforcement of this and I know of no one being arrested or getting in trouble (if you do, feel free to comment). It is also limited to only giving you the password (unlike spying) and it is meant for those with above average computer skill setup.
No comments:
Post a Comment