Thanks to visit codestin.com
Credit goes to www.scribd.com

100% found this document useful (1 vote)
142 views1 page

Hacking Method 4

The document outlines a method for obtaining personal information from a target through social engineering and data breaches. It describes steps to gather the target's email and check for leaks using various online tools and forums. Additionally, it advises on maintaining anonymity while conducting these activities using Tor Browser and a VPN.

Uploaded by

fabio cunha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
142 views1 page

Hacking Method 4

The document outlines a method for obtaining personal information from a target through social engineering and data breaches. It describes steps to gather the target's email and check for leaks using various online tools and forums. Additionally, it advises on maintaining anonymity while conducting these activities using Tor Browser and a VPN.

Uploaded by

fabio cunha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 1

Pros Jacking Method.

First You try to get info from the target' for example: Hey' can I get your paypal?
I want to buy something' the target will send his email' it's 99% of the time that
he doesnt use his main email ofcourse' so you'll have to dox him. You can use
http://pipl.com to try to get his email. There are some tutorials on youtube. When
you got the email you can go to https://haveibeenpwned.com and enter the email' if
it turns red you got a hit. For example' you see that it has been leaked in the
database "000webhost" then you go to forums like: http://raidforums.com or
http://leakforums.com or nulled.to and try to find it there' download the database
and search for the email' you'll find it if you downloaded the database. Sometimes
it's plain text and sometimes its decrypted. HaveIbeenpwned sometimes says in the
description if it is encrypted and with what kind of encryption. A good site to
decrypt the "Encrypted password" is http://finder.insidepro.com If everything goes
correct you have a chance that you got the email of the target + the password now.
Have fun hacking!
How to stay anonymous?
Get Tor Browser, do EVERY hack thing on there. Use a VPN (I prefer IPVanish).

You might also like