xprincessrachel
Cyber Threat Analyst
Divine
2
MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1
400 XP
What is cracking?
Cracking is the art of using combolists(usually Email: Password) against a particular website by using various tools to find hits or in simple terms accounts that have premium subscriptions, purchased items, attached payment methods etc.
Steps:
1. First of all you need keywords for dorking. You can use keyword scrapers(Link at the end of the tutorial), sites(keywordtool.io) or choose to scrape for keywords manually.
(For example, you want to crack accounts for NordVPN, you will use keyword scraper to scrape for keywords related to NordVPN)
2. Now you need to use your keywords in a Dork Generator(Link at the end of the tutorial) or create your dorks manually(which might be a little too advanced for you right now).
3. Now use a Dork Searcher to search for URLs, these URLs are later going to be used in a Sqli Dumper to find exploits In the dork searcher(Link at the end of the tutorial) you need to make sure that "Anti Public" is on, you can find free proxies on proxscrape or use HQ proxies for better results.
4. Now that you have your URLs it is time to use the Sqli Dumper to find sum exploits! For this tutorial we are using 8.5( imo 8.3 works the best,).
5. Open up your Sqli Dumper and import all your URLs by clicking on "import" and select your .txt file with the URLs.
6. Once they have all been imported go to "Exploitables" and click on "Start Exploiter". Hopefully there are going to be a bunch of URLs!
7. When that is done. Go the the "Injectables" section and click on "Start Analizer". This will find URLs that can be injected.
8. Select all the URLs that come up and type "email" and "password" down in the Search Columns/Tables Names. Then press "Start".
9. Right click on one of the URLs and press "Go To Dumper".
10. Find the table with usernames and passwords, then export them.
11. After that, you use checkers or configs, to check the combolist you just dumped from SQLi Dumper( I will use NordVPN checker/config in this case since my keywords and dorks targeted NordVPN, I will not be telling you how to use checkers/configs in the tutorial).
Note - At first, I was going to include images for better explanation but I got kinda lazy and the main purpose of this tutorial is for beginners to understand basic cracking and it's terminologies.
Another Important Note - Always use Sandboxie/RDP/VM when running tools.
Terminologies used -
Keyword - A keyword, or a focus keyword as some call it, is a word that describes the content on your page or post best.
Dorks - A dork involves using advanced operators in the Google search engine to locate specific strings of text within search results and can be use to find security holes in the configuration and computer code and perform a SQL Injection which execute malicious SQL statements to get databases.
URLs - Uniform Resource Locator(Self Explanatory)
Proxies - A proxy acts as a gateway between you and the internet.
Checker - An account checker is an attack tool that takes lists of spilled username/password pairs (i.e. “credentials”) and tests them against a target website.
Configs - Configs are used on applications like OpenBullet,Storm etc to check for hits using combolists and proxies
I am always trying to help you and the community with useful threads and if you think I deserve like and Rep then do so thank you so much
Made with
for the community
SHOW SOME APPRECIATION FOR MY EFFORTS DONT FORGET TO GIVE IT A LIKE TO THIS POST FOR SUPPORT
BE KIND AND LIKE THE POST + REP AND STAY BLESSED
Cracking is the art of using combolists(usually Email: Password) against a particular website by using various tools to find hits or in simple terms accounts that have premium subscriptions, purchased items, attached payment methods etc.
Steps:
1. First of all you need keywords for dorking. You can use keyword scrapers(Link at the end of the tutorial), sites(keywordtool.io) or choose to scrape for keywords manually.
(For example, you want to crack accounts for NordVPN, you will use keyword scraper to scrape for keywords related to NordVPN)
2. Now you need to use your keywords in a Dork Generator(Link at the end of the tutorial) or create your dorks manually(which might be a little too advanced for you right now).
3. Now use a Dork Searcher to search for URLs, these URLs are later going to be used in a Sqli Dumper to find exploits In the dork searcher(Link at the end of the tutorial) you need to make sure that "Anti Public" is on, you can find free proxies on proxscrape or use HQ proxies for better results.
4. Now that you have your URLs it is time to use the Sqli Dumper to find sum exploits! For this tutorial we are using 8.5( imo 8.3 works the best,).
5. Open up your Sqli Dumper and import all your URLs by clicking on "import" and select your .txt file with the URLs.
6. Once they have all been imported go to "Exploitables" and click on "Start Exploiter". Hopefully there are going to be a bunch of URLs!
7. When that is done. Go the the "Injectables" section and click on "Start Analizer". This will find URLs that can be injected.
8. Select all the URLs that come up and type "email" and "password" down in the Search Columns/Tables Names. Then press "Start".
9. Right click on one of the URLs and press "Go To Dumper".
10. Find the table with usernames and passwords, then export them.
11. After that, you use checkers or configs, to check the combolist you just dumped from SQLi Dumper( I will use NordVPN checker/config in this case since my keywords and dorks targeted NordVPN, I will not be telling you how to use checkers/configs in the tutorial).
Note - At first, I was going to include images for better explanation but I got kinda lazy and the main purpose of this tutorial is for beginners to understand basic cracking and it's terminologies.
Another Important Note - Always use Sandboxie/RDP/VM when running tools.
Terminologies used -
Keyword - A keyword, or a focus keyword as some call it, is a word that describes the content on your page or post best.
Dorks - A dork involves using advanced operators in the Google search engine to locate specific strings of text within search results and can be use to find security holes in the configuration and computer code and perform a SQL Injection which execute malicious SQL statements to get databases.
URLs - Uniform Resource Locator(Self Explanatory)
Proxies - A proxy acts as a gateway between you and the internet.
Checker - An account checker is an attack tool that takes lists of spilled username/password pairs (i.e. “credentials”) and tests them against a target website.
Configs - Configs are used on applications like OpenBullet,Storm etc to check for hits using combolists and proxies
I am always trying to help you and the community with useful threads and if you think I deserve like and Rep then do so thank you so much
Made with

SHOW SOME APPRECIATION FOR MY EFFORTS DONT FORGET TO GIVE IT A LIKE TO THIS POST FOR SUPPORT
BE KIND AND LIKE THE POST + REP AND STAY BLESSED
Loading…
imgbb.com