welcome

Earning world

Saturday, November 20, 2010

How to Hack yahoo id

This is only for education purpose to inform you how hackers exploit yahoo messenger to hack your computers.

So who ever try this is doing in it your own risk this tutorial is just for to guide you how hackers can attack your computer and steal vital information.
But before that you need to know some few things of yahoo messenger chat protocol

Following are the features: -
1) When we chat on yahoo everything goes through the server. Only when we chat messages tracked on yahoo sever.

2) When we send files yahoo has 2 options

a) Either it uploads the file or other client has to down load it.
Either it connects to the client directly and gets the files

3) When we use video or audio:-
a) It either goes through the server

Or it has client to client connection

And when we have client to client connection the opponents IP is revealed. On the 5051 port. So how do we exploit the Chat user when he gets a direct connection? And how do we go about it. Remember i am here to hack a system without using a TOOL only by simple net commands and yahoo chat techniques. Thats what makes a difference between a real hacker and new bies.

So let’s analyze
1) It’s impossible to get Victim IP address when you only chat.
2) There are 50 % chances of getting an IP address when you send files
3) Again 50 % chances of getting IP when you use video or audio.
So how the hackers exploit those 50 % chances using yahoo messenger to get IP.

I'll explain only for files here which lies same for Video or audio

1) Go to dos
type ->
netstat -n 3
You will get the following output.Just do not care and be cool
Active Connections

Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED

Active Connections

Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED

Just I will explain what the output is in general. In left hand side is your IP address. And in right hand side is the IP address of the foreign machine. And the port to which is connected. Ok now so what next ->

2) Try sending a file to the Target.
If the files comes from server and the file is uploaded leave it, you will not get the ip. But if a direct connection is established then the first attacker first phase is over.

This is the output in your netstat. The 5101 number port is where the Attacker is connected.

Active Connections
Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
TCP 194.30.209.15:5101 194.30.209.14:3290 ESTABLISHED

3) So what next???
Hmmm........ Ok so make a DOS attack now
Go to dos prompt and
Just do
nbtstat -A Attackers IPaddress.Can happen that if system is not protected then you can see the whole network.
C:\>nbtstat -A 194.30.209.14
Local Area Connection:
Node IpAddress: [194.30.209.15] Scope Id: []
NetBIOS Remote Machine Name Table
Name Type Status
---------------------------------------------
EDP12 <00> UNIQUE Registered
XYZ <00> GROUP Registered
XYZ <20> UNIQUE Registered
XYZCOMP1 <1E> GROUP Registered
MAC Address = 00-C0-W0-D5-EF-9A

Using this MAC address you can connect victim computer and remotely operate the victim computer and do whatever what hackers do.

So in order to get saved from hackers and attackers you need good firewall protection and antivirus system. Download or update your antivirus and firewalls in order to be safe from hackers.

So the conclusion is never exchange files , video or audio till you know that the user with whom you are chatting is not going to harm you.

No comments:

Post a Comment