several methods of hacking :
1️⃣ tx database
The tx database has been leaked, and the password is queried through the database
2️⃣ Intranet capture
Sometimes, the internal network sniffing packet capture can also intercept the password, Xiaofeng has not tested qq, but now it seems unlikely.
3️⃣ Fishing
Phishing software, phishing websites, etc., imitating the official trick to entice users to enter the account password to send to the server.
(Have you ever seen anything in the QQ space message board of other people, "Why are your photos in other people's space?" and then a URL. You click to enter a disguised space page to log you in. Once you log in, sorry your space will be sent automatically. Countless ads)
4️⃣ Social workers
Based on the understanding of the user, the password combination is derived.
5️⃣Remote control The remote control goes online and the keyboard records.
6️⃣ Brute force cracking is
generally aimed at weak passwords, strong passwords are not easy to be cracked.
7️⃣ Ask him directly.
This method is simple and rude. Of course, the other party's behavior may also be simple and rude.
8️⃣Account appeal
One of the methods of social work, which requires all kinds of kinky ideas to obtain all kinds of information
9️⃣Disguise security center mail
(If there is an email sent to your secret security mailbox asking you to fill in the verification code you just received, then this must be fake)
SHARE US ❤️👍🏻
@ethtophackers
@ethtophackers
1️⃣ tx database
The tx database has been leaked, and the password is queried through the database
2️⃣ Intranet capture
Sometimes, the internal network sniffing packet capture can also intercept the password, Xiaofeng has not tested qq, but now it seems unlikely.
3️⃣ Fishing
Phishing software, phishing websites, etc., imitating the official trick to entice users to enter the account password to send to the server.
(Have you ever seen anything in the QQ space message board of other people, "Why are your photos in other people's space?" and then a URL. You click to enter a disguised space page to log you in. Once you log in, sorry your space will be sent automatically. Countless ads)
4️⃣ Social workers
Based on the understanding of the user, the password combination is derived.
5️⃣Remote control The remote control goes online and the keyboard records.
6️⃣ Brute force cracking is
generally aimed at weak passwords, strong passwords are not easy to be cracked.
7️⃣ Ask him directly.
This method is simple and rude. Of course, the other party's behavior may also be simple and rude.
8️⃣Account appeal
One of the methods of social work, which requires all kinds of kinky ideas to obtain all kinds of information
9️⃣Disguise security center mail
(If there is an email sent to your secret security mailbox asking you to fill in the verification code you just received, then this must be fake)
SHARE US ❤️👍🏻
@ethtophackers
@ethtophackers