0% found this document useful (0 votes)
18 views2 pages

A 876778 e 6 C 8 e

Cracking

Uploaded by

gts2319984sodiq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views2 pages

A 876778 e 6 C 8 e

Cracking

Uploaded by

gts2319984sodiq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

What is cracking?

Cracking is the art of using combolists(usually Email: Password) against a


particular website by using various tools to find hits or in simple terms accounts
that have premium subscriptions, purchased items, attached payment methods etc.

Steps:

1. First of all you need keywords for dorking. You can use keyword scrapers(Link at
the end of the tutorial), sites(keywordtool.io) or choose to scrape for keywords
manually.

(For example, you want to crack accounts for NordVPN, you will use keyword scraper
to scrape for keywords related to NordVPN)

2. Now you need to use your keywords in a Dork Generator(Link at the end of the
tutorial) or create your dorks manually(which might be a little too advanced for
you right now).

3. Now use a Dork Searcher to search for URLs, these URLs are later going to be
used in a Sqli Dumper to find exploits In the dork searcher(Link at the end of the
tutorial) you need to make sure that "Anti Public" is on, you can find free proxies
on proxscrape or use HQ proxies for better results.

4. Now that you have your URLs it is time to use the Sqli Dumper to find sum
exploits! For this tutorial we are using 8.5( imo 8.3 works the best,).

5. Open up your Sqli Dumper and import all your URLs by clicking on "import" and
select your .txt file with the URLs.

6. Once they have all been imported go to "Exploitables" and click on "Start
Exploiter". Hopefully there are going to be a bunch of URLs!

7. When that is done. Go the the "Injectables" section and click on "Start
Analizer". This will find URLs that can be injected.

8. Select all the URLs that come up and type "email" and "password" down in the
Search Columns/Tables Names. Then press "Start".

9. Right click on one of the URLs and press "Go To Dumper".

10. Find the table with usernames and passwords, then export them.

11. After that, you use checkers or configs, to check the combolist you just dumped
from SQLi Dumper( I will use NordVPN checker/config in this case since my keywords
and dorks targeted NordVPN, I will not be telling you how to use checkers/configs
in the tutorial).

Note - At first, I was going to include images for better explanation but I got
kinda lazy and the main purpose of this tutorial is for beginners to understand
basic cracking and it's terminologies.
Another Important Note - Always use Sandboxie/RDP/VM when running tools.

Terminologies used -

Keyword - A keyword, or a focus keyword as some call it, is a word that describes
the content on your page or post best.
Dorks - A dork involves using advanced operators in the Google search engine to
locate specific strings of text within search results and can be use to find
security holes in the configuration and computer code and perform a SQL Injection
which execute malicious SQL statements to get databases.

URLs - Uniform Resource Locator(Self Explanatory)

Proxies - A proxy acts as a gateway between you and the internet.

Checker - An account checker is an attack tool that takes lists of spilled


username/password pairs (i.e. “credentials”) and tests them against a target
website.

Configs - Configs are used on applications like OpenBullet,Storm etc to check for
hits using combolists and proxies

I am always trying to help you and the community with useful threads and if you
think I deserve like and Rep then do so thank you so much

You might also like