May 17, 2020

Hack VK

So I will do the chapters:

1) Newbie
2) Knowing
3) Expert
I think you can start.

CHAPTER: BEGINNER.

Themes.

What does hacking mean?

What is the main thing for hacking?

Perception of human psychology.

The rules of anonymity.

How to register fakes?

How to arrange fakes?

The simplest methods of hacking.

1. What does hacking mean?

We hack people to get their data. We want to know his personal and secret information, usually for further use of this information. Everything is pretty simple. But ... Not so simple. The essence of hacking is much deeper than you think. This is a whole philosophy. We must hack a person so that he does not know about it, so that he remains a happy elephant. This is the difference between a good hacker and a bad hacker. He should understand the cleaning of his tracks, anonymity and, of course, psychology.

2. What is the main thing for hacking?

Of course you can say that this is the ability to crack. Or maybe the ability to clean up the traces. NO!
The main thing for hacking is social engineering.

3. Perception of human psychology.

What do we call the word psychology?
Human thinking, which is systematized and performs certain functions. It depends on emotions, factors from outside, including man. Let's compare the human brain with a computer? Both that, and that - a system. We write viruses, create phishing and by any means crack the computer, the system.
We are looking for vulnerabilities, and through them we penetrate the core of the program. So what forbids us to find this vulnerability in the human brain? What prevents us from hacking and delving into its settings? If the vulnerability of the system is digital errors, errors in the code, then the vulnerability of a person is his feelings and emotions. You can easily put pressure on a person’s “vulnerability” and gain remote control. Man turns into a puppet. The main thing is to be able to manage the system. I urge all people to perceive the human brain - as a system. If a person breaks into computers, he does hacking, and if a person breaks into the human brain, he practices social engineering. I will help you with social engineering and psychology. I hope I was able to impress you. I think after reading this article you understand a little more about human psychology. You can go on.

4. Rules of anonymity.

I will tell you a great thing. If you consider yourself 100% anonymous, you are stupid. 100% anonymity does not exist due to commonplace human errors. We are all vulnerable, we are all not safe. Especially now we live in such a time ... States have thought that it is necessary to take control of the Internet.
We are all under the hood.
But now I will tell you the main ways to hide from justice as much as possible.
1) VPN is the easiest way to anonymize. In fact, it protects quite well, and if you are engaged in seruga, then it is quite enough. BUT! It protects only from the state. Of course, if they take you seriously, then of course they will, but usually they don’t give a shit. If hackers want to hack you, then you are protected by exactly 0%! So use at your own risk. By the way, I mean at least a dual VPN.
2) TOR - An ideal defense against the state. Therefore, it uses it. It will be very difficult for the state to find you if you carry out dirty work in this browser. But .. From hackers you have zero protection. If you want to deanonymize malware using web browser vulnerabilities and so on, I have no chance.
3) You <- VPN + Dedic + TOR -> Internet - The ideal combination for complete anonymity on the network. In this case, not with hackers, not with the state, there is almost no chance to deanonymize you. The only minus of the ligament is speed. Tor will influence her as much as possible

5. How to register fakes?

Finally, we can move on to the sweetest. You now know about psychology, about anonymity. Now you can hack vk accounts? No…
Now is the time for preparation! First of all, you should register a fake. What for? For those who don’t know, I’m briefly telling. The most popular way to hack VK is phishing. Both beginners and experts use it.
What is phishing?
Okay, I’m telling the lamers. Phishing is a site tailored to the official site of a large company. Let's say - VKontakte. We fake an authorization site, a person does not notice a fake, enters his data there. Everything is hacked. But! We will not lure people to our fakes from our pages? That's why we need a fake. To register an account in VK, you need a phone number, where can I get it?
There are 2 popular sites:
sms-area.org
sms-reg.com
On them you can register and buy virtual numbers for 20 rubles. After you rented a number, enter it in the registration field, click on the checkbox on the numbers website and wait for the code.

6. How to arrange fakes?

We will arrange fakes under the administration of VKontakte.
I show an example:

I think to tell how to make such a profile is not necessary?
Go to settings, privacy settings, set everything as private as possible. Upload an avatar, hide a photo on the wall. Set the status to “Alert ...”
The simplest methods of hacking.
Here you have a ready account, you are anonymous, versed in social engineering, it's time to hack! Since this chapter is for beginners, I think you don’t even know how to put sites on a hosting, so I will advise you to use free hacking services. (More complex schemes in the following chapters)
In Google, find the services that provide phishing sites, namely phishing VK.
After you have found and your phishing page is ready, go to the treasured hack: 1) We need to shorten the link in vk.cc (If the link does not shorten, go to clck.ru, shorten it, then go to vk.cc) 2)
We write this message:
Hello @id
We hasten to inform you: recently, a transition to a dubious resource has been made from your page. In order to protect your data, we ask you to immediately change your password and use an online scanner to prevent infection of the application / browser. Verification will take no more than 5 minutes:
*Link*
If you ignore the security requirements, the account will be frozen after 24 hours from the moment you read this notice.
Notification # 19827 sent automatically.
Sincerely, VKontakte Team
Instead of “id” we indicate the id of the victim. I forgot to say that we put it on the wall. After you post, the victim will see this:

Then everything is clear .. With a high probability the victim will follow the link, enter your data and you are in PROFIT. BUT there is one minus. With this service you can’t get Token, thanks to which you can bypass alerts and SMS confirmation. So I’ll tell you about the workaround in the second chapter. By the way, it begins!

CHAPTER: KNOWLEDGE.

Themes.

About all available methods of hacking VK

Domains and Subdomains

Database setup

Work with phishing

A method of bypassing alerts and SMS confirmation

Real-time Hacks

Dumping several phishing scripts

1.About all available methods of hacking VK.

So we are moving on to more complex ways of hacking vk.
And what are they by the way?
See:
1) Phishing. (The most popular and one of the most effective methods of hacking. We will put fake sites and domains on our hosting.)
2) Hacking in real life. (The most extensive area of ​​hacks. Here you can think of an infinity of ways for one reason! Social engineering. In order to crack well in real life, you need to understand social engineering. At least minimally.)
3) Password brute force. (People basically create passwords related to their lives. Important dates, hobbies, pets .. We will use this)
There are still a lot of ways, but you will already hear about more complex ones in the “expert” chapter.

2. Domains and subdomains.

Here I have a question for you.
How do you like the domain:
vk.com.professional-scanner.ru?
This is not vkuntukte.su for you. Or, generally, naebal-tebya.com on which phishing costs. And just to create such a domain, or rather a subdomain, we need hands .. (I thought what I needed, I never came up with it. I really only need hands)
We register on a free hosting, I recommend you 2 hosting:
zomro.com
timweb.com
Good, fast. And after we are registered, we go to register the domain. (I advise you to buy the .ru domain, but you can also free) Register such a domain (for example): spam-cleaner. (Domain) And after registration we create a subdomain. We will have a pallet - vk.com So it turns out: vk.com.spam-cleaner. (Domain) Cool? Cool. We pass to the script.

3. Setting up the database.

Basically, if a phishing script is good, it has its own admin panel. Of course, it is not mandatory, especially for hacking certain people, but it is more convenient with it.
In general, to connect this admin panel, you need to connect the Database. How will we do this? I do not see the point of throwing screenshots, everyone's hosting is different.
After registering a hosting, you should go to billing. You will have the column “MySQL database” (everywhere in different ways). Come over there.
After you need to specify:
1) Database Name
2) Username (Not everywhere)
3) Password from the Database
After press “create”. All you have created! What's next?
Go to your script folder, open the config.php file (usually one). Insert your data in it.
Find the column “DBData”. Everything will be next to her. :
1) user
2) DataBase
3) password
After the data is specified, look for the graphs that should be in your database. When you find them, go to your DB via phpmyadmin and add all these graphs to the database. After you put the script and everything should work. So I think I told everything intelligibly.

4. Work with phishing.

Finally, you can proceed with more complex methods of hacking. Although to be honest, they are not much different from schemes for beginners. In general, I will not merge any of my scripts, sorry, the manual is already free, but of course I will throw off the photos. Whoever needs to, copy. For the first method, we need a script like this:

That is, after clicking on the link, the person enters the album. The method is suitable for girls.
The link will be approximately:
vk.com.album-34626584-2153135641. (domain)
A person got into the album, and after 5 seconds a redirect to this page occurs:

In general, I tell you how it will work. Register a girl’s account, at least fill it out a little (preferably with a good profile).
After social engineering begins. (Nastya is us)

After which the victim in most cases should follow the link and log in. Everything is realistic to the maximum. But if you are not authorized? Sent?
Do not worry! This method does not end there.
The victim either didn’t follow the link, or even exposed in a hack, we simply disconnect and do nothing.
We wait about 3-4 hours and use another method against it.
Now there will be a game for complaints.
We will use the following script: After clicking on the link, this will be:

Then:

As you can see, we are trying to expose ourselves as hackers. The victim sees the link that she followed a few hours ago. She must enter a phone number.
AND! When she enters, everything will be as usual. “Expect SMS” and so on. That is, she will really wait for SMS.
The SMS input field will be opened. But SMS certainly will not. The site is fake. After she doesn’t receive SMS, she will click the “SMS did not come” button and she will be transferred to:

And of course, we steal the “Old Password”. I think with these two methods, the chance of hacking is almost guaranteed. And we are moving on to another method. We will use this simple script:

That is, after clicking on the link, a person will see this. The script works almost the same. Just a little cooler. The victim below should identify 2 times his friends. After will be such a window:

And after entering the phone, of course the fake code:

The victim presses “The code did not come” and sees:

That's all. Now let's talk about how we will hack. In fact, everything is the same as at the beginning of the first chapter. I was telling.
We write the following message:
Hello @id
We hasten to inform you: recently, a transition to a dubious resource has been made from your page. In order to protect your data, we ask you to immediately change your password and use an online scanner to prevent infection of the application / browser. Verification will take no more than 5 minutes:
Link
If you ignore the security requirements, the account will be frozen after 24 hours from the moment you read this notice.
Notification # 19827 sent automatically.
Sincerely, VKontakte Team
Here the chances are a little less, but it seems to me that with such a cool script and the vk.com subdomain, the chances are also high. And now let's talk about mass hacking?
Mass hacking will be associated with Ask. What? Yes..
For hacking, we need to create an ask.fm account. We make an account of some kind of girl. We also create an instagram of this girl. We make it closed. Add one avatar everywhere. At least the same girl. The name is of course the same .. Further into the profile description of the insta, we add a link to the phishing site VK.
Type: vk.com.id32612346.ru
We ask ourselves 2-3 anonymous questions in the ask, and stupidly answer. I don’t know .. “What kind of dogs do you like?” etc.
And then we ask the question “How to find you in VK?” and answer: