sodusme

Members
  • Content Count

    63
  • Last visited

Community Reputation

3 Neutral

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. You need a valid Cox email login? If this is right I have cracked Cox logins, leave a response if that is what you are looking for and I'll give you one.
  2. Hiya! These are some main rules with cracking: (see links at the bottom) Rule #1: NEVER use Slayer Leecher. You will always get public shit combos. If you plan to sell your combos they most likely will already be cracked. Rule #2: Don't follow YouTube video's on how to crack, they don't know what the fuck they are doing (most of the time) and just want views. Explains why they have a shit load of tags. Rule #3: Always use a VM, sometimes there is malware in crackers they can and will fuck up your PC, I know this at the first-hand experience. Rule #4: If you plan to sell, buy proxies using free ones aren't that good because they usually miss potential hits. Rule #5: Use a VPN. Don't want dem feds after u. You don't have to use a paid one like NordVPN (but if you want to check my Shoppy for cheap Premium ones) Winscribe will do just fine. Ok done. A basic guide on how to start. Links: (cracking pack) https://cracked.to/Thread-SUPREME-Cracking-Pack-Good-for-New-Crackers-My-Favorite-Tools (Netflix keywords) https://anonfile.com/Oc9c53z3na/Netflix_KeyWords_txt Rule #1 not always true ALL combos are "public", private combos don't really exist. Human nature is for targets to use their user/pass combos repeatedly across different sites. You might think you're getting "private" combos, but I can assure you that target is using that combo somewhere else on the web for another login and someone has already gained access to it through a SQLI (you just may not have cracked it yet). People resist change and don't like changing their user/pass combos from site to site and thus will use the same ones. Rule #2 There are some really good Youtube videos regarding Sentry MBA and OpenBullet. Rule #3 You can use Sandboxie you don't need to set up a VM. Rule #4 Private proxies ARE better but that's just because you'll be rate limited and/or blocked on certain sites. If your keywords are correct you shouldn't "miss" hits because of proxies. Rule #5 What are you using a VPN for? To check hits? To read tutorials? You can't use a VPN to crack with since you'll be banned because its the same I.P. being seen. A VPN is not really needed for the others. I think your goal here is to sell shit and not really "help" LOL. Read up on targeting sites with "keywords". So if you're targeting a lesbian site people who subscribe to a lesbian site are more likely to subscribe to more than one. If you are targeting a big tit site people who subscribe to a big tit site will likely subscribe to more than one. Slayer Leecher is fine to use because you aren't going to have the skills to perform a SQLI and get combos that are "less used". Like I said private combos don't really exist---people think they do. When in reality they have just performed a SQLI on a site and that same login is being used across different sites its just that no one has cracked it yet on the other site(s). Look up tutorials on password use and you will see the most used login password is 123456. That is the kind of information that will help you. If you can "leech" usernames from a particular site OR for a particular site----half your work is done ;) since we know that people tend to use 123456 as a password you can pair those and have a successful combo. Start with an easy porn site don't jump right in and try Netflix or Facebook which are extremely difficult. Facebook is actually impossible anyways since they use GEO I.P. tracking for logins. That means if the I.P. varies greatly from the login they will lock the account---many other sites are using this technology. Read, read, and read more and YES you can use Youtube there are some great tutorials on there for Sentry MBA and Open Bullet.
  3. I won't offer "private" help so please don't PM me or anything I'll try to answer here when I can. First off NOT all sites are vulnerable to a SQLI. Secondly, for this to be effective you have to understand what a SQLI is and that is you are manipulating a URL on the website to give an error---once that error is discovered you can likely use that error to gain access to the .DB and dump any information you want. Now of course you know about "dorks" so you have to have a successful dork to error out the URL and gain access to the .DB. Like I said though, not every site is vulnerable to a SQLI, websites pay big money to "white hat hackers" to scan their websites and seek out potential SQL line errors. So it could be that you are just targeting websites that are not vulnerable. I can tell you if you are targeting Facebook, Twitter, Spotify, Hulu and those you are unlikely to discover a dork---at least not on your own. I know Facebook had a recent vulnerability and they plugged it immediately and it was a cookie error not SQL related. Some hackers found out a way to gain access to the unique cookie identifier for users and exploited that information. Now with all that said I am no expert by any means but, I HAVE dumped a .DB or two in my day but it was sites I found a SQL line error with using Havij. So I know it can be done with persistence and the right dorks.
  4. Lets give this a try and see if its working....
  5. Not really as a guest, every username i use is "administrator" or "admin" with his right password using NLBrute so that should let me in Looks like maybe privileges have been revoked: https://theitbros.com/to-sign-in-remotely-you-need-the-right-to-sign-in-through-remote-desktop-service/
  6. That's saying that only the "administer" of the PC has the rights to login remotely through RDP. You are trying to sign in as a "guest" I think?
  7. Sorry I don't know of any good paid sites however I think I saw a thread here where somebody was comparing proxy sites.
  8. OK so Netflix is a little different. If you are trying to crack that you WILL need private proxies since they ban proxies quickly and every one is trying to crack them so they are seeing the same proxies over and over and over and are banning them quickly. Steam I have not tried recently but would wager that its the same.
  9. Pretty sure that I already answered this....someone is playing games? YES you can use free proxies and YES you can use the same proxies. If the person who deleted my last reply doesn't know who I am---Google my fuckin' nickname. Keywords used are those representing what kind of combos you want to leech i.e. @emaildomain.com (insert whatever email domains you want to leech there) and streaming sites and XXX sites and so forth. I'll expect that this response doesn't get deleted this time?
  10. A config is the parameters or information needed to crack a webpage login. It will consist of whether the login delivers information from server to client with GET or POST data. It will have the fields necessary for a login to be attempted I.E. , fields, a token (CSRF or other string) or variable if needed, submit login command, and any other information needed to submit a valid login request server side from the client. It will also have the "failure" key which is any key or phrase denoting a failed login, and the "success" key which is any key or phrase denoting a successful login. It will also have whether proxies need to be run and what kind or proxies and what combo list is needed (user/pass or email/pass or both). So in short a config is ALL the information needed to crack or attempt to crack a webpage login.