Login to the site using someone else’s account without a password


Via page code

Many users are interested in the question of how to find out the password from VK if they logged in from my computer? If you have access to a person’s computer, then it is most convenient to view it through the page code. To do this you need:

  • Go to the start page with a login form;
  • Left-click on the window with the saved login data;
  • In the window that appears, find “View element code”;
  • Edit the line, you need to replace “password” with “text”.

After such changes, a numerical combination will appear instead of asterisks on the start page. It is worth noting that many users know how to find out their VK password through the page code, so you should not save data in the browser when logging in from someone else’s computer.

Part 4: Instagram Hacker (https://hackinstagram.net/crack-instagram-passwords/)

This Instagram hack is free to use and works with a quick setup process that includes downloading their software and following instructions. There are no hidden costs at all. Just download hackinstagram.net software and you can joke with your friends or keep an eye on your kids without touching their mobile devices.

pros

  • Easy to set up. In less than five simple steps, you can access Instagram passwords for your friends and family.
  • The best tool when you need to recover your Instagram account password.
  • For free.

Minuses

  • You must download the application
  • With advertising.

Password guessing method (if login is known)

Now we’ll tell you how to find out the password from VK, knowing the login - through the number attached to the page. You need to do these steps:

  • Click on “Forgot your password”;

  • In the line that appears, enter your phone number and click “Next”.

  • Then write your last name indicated in the account;

  • Click on “Get code”.

  • In the new window, enter the code that will be sent to your phone.

Next, you can create new login information.

Please note that you can link the page to another phone number if for some reason you can no longer use the old one.

Three ways to hack a social network account

To hack an Instagram profile, there are only three methods available:

  • Install spyware on your computer or smartphone. These could be parental control apps;
  • selection of passwords. But in the event that the “burglar” approximately knows the combination;
  • spy file. It is often blocked by Instagram, so this method is suitable for those who already have a general correspondence open.

PC programs aimed at saving passwords and data entered by the user will help you open Instagram. The disadvantage of this method is that the owner of the required account can work with the social network outside the web version.

Password guessing is one of the old ways of obtaining other people's data. But unlike programs and applications, it takes more time. Also, Instagram has a login blocking system if the password has been entered incorrectly ten times. A notification appears on the screen: “Suspicious attempt.”

Spyware or phishing is the creation of a web page or file that collects information when you click on a link. It belongs to the category of radical methods and is legally unacceptable.

Install a spy app

Spy apps will help you hack through your phone. These are utilities for parental control, where you can get information about the resources and passwords visited by another user. On the computer version, there is a second way to get a password - use automatic saving in Google accounts.

If the person you want uses a browser with autosave and visits Instagram using the web version:

  1. Open the browser - go to the section: “Settings”.
  2. Passwords – enter “Instagram” in the search.
  3. Find the account you need - click on the icon in the form of a closed eye.

    Saved passwords in the browser

  4. Enter data from your computer - copy the password.

Using the MSPY mobile and desktop application, you can access someone else's Instagram account. But in this case, the utility must be installed on both devices. The software is designed for parental control: in paid and free versions.

The developers claim that after installing mSpy, the application will work in the background. To use it on a smartphone, you need to buy a paid version.

Hands-free on Instagram: what are they for?

The software works on the principle:

  1. The user installs the software on both computers or smartphones.
  2. Connects to the second person's account.
  3. Indicates in the parameters: “Real-time monitoring”.
  4. When connected to a network, it receives information about the actions of another.

The official website states: “Do not use for illegal activities. The second user should be notified that there is a tracking application on their device.”

Password selection

Hacking a password on Instagram is possible through third-party services or password guessing programs. You need to download and install an application with this functionality on your computer. Next, the user must enter the initial data: for example, the login and date of birth of the desired person.

Basic ways to determine a password:

  • use important dates and the full name of the user you are looking for;
  • date of birth and email address;
  • combinations that match the login.

These are standard passwords that are more common among recently registered accounts. Typically, the length of the combination is no more than 8 digits.

One of the programs where you can find a password is L0phtCrack 7. The tasks of the software include auditing the page file, searching for possible codes of up to 30 characters. The utility is offered in paid and free versions. Designed for advanced users and creates a local machine for operation.

An easier way is to use services for generating a list of passwords. For example, through LastPass and 1password. The “Cracker” specifies standard information and starts creating combinations. That is, this is a manual selection that leads to the error: “Suspicious login attempt.”

Send a spy file on Instagram

A phishing page is a special, fake link that leads to a data collection page. That is, you need to send another user the address of a fictitious site and wait until he visits it. To make the link natural, “crackers” indicate standard names and combinations. For example, they hide a third-party phishing address behind a picture on Facebook or an Instagram profile.

How to collect data:

  1. Create a page in HTML using the design of the source site (for example, Facebook).
  2. Insert the SocialFish script into the index.html file.
  3. Install components: Pythonx, wget and huepy, pip3, PHP, SUDO.
  4. Depending on the operating system, updates and Kali Linux on Windows are required.
  5. Enter launch combinations.

The page will be cloned, after which the user must sequentially enter the combinations: git clone https://github.com/UndeadSec/SocialFish.git in the terminal and further.

The method is also designed for users who have previously created Internet pages and worked with the Python programming language. Methods for obtaining passwords and data are also divided into: XSS and sniffer. Both methods are aimed at creating your own pages and introducing scripts into them.

Creating a twin site

If the information could not be found out, then you can create a duplicate account with an exact repetition of the basic information, but with different login information.

Important: on the Internet you can find many applications that allow you to cope with such a task as finding out the login and password of someone else’s VK page to log in. In fact, this is just a beautiful bait for scammers.

How you are attacked

So, first things first. There are several most common attack options:

Software level attacks

Injecting malware into a user's system or exploiting vulnerabilities in existing software. This is still the most widespread and effective method of hacking. The spread of antiviruses, built-in firewalls, forced activation of UAC, auto-updates, and increased overall OS security improve the situation somewhat, but cannot 100% protect users from their own rash actions.

Users still regularly download “cracked” software with “treatment” included. What they end up with is malicious code that injects itself into the connection (traffic level) or process (through known vulnerabilities) and steals personal account data.

Millions of emails containing links to malware are sent every day. Existing antispam solutions are quite effective, but none of them provide complete protection.

Traffic Level Attacks

There are two types of such attacks - in the form of a sniffer of unprotected traffic and in the form of attacks on protected traffic (man in the middle, MITM).

1. This hacking method is more effective than the first, but is more difficult to implement technically, which is why it has not become so widespread. Primarily due to territorial limitations, the attack must be carried out directly on the incoming and outgoing connections, and for this you need to physically have access to them.

The essence of the sniffer is very simple: all traffic passing through it is scanned for the presence of unencrypted credentials, the found credentials are saved and subsequently used by attackers.

This type of attack is in most cases invisible to the user. However, it is still effective, because many popular services still transfer user data, messages and files in clear text. For example, VKontakte relatively recently began to protect its traffic - before that, for many years, the transfer of information was completely in the clear - all messages, files, likes and passwords were available to anyone. Naturally, we are talking about those cases when the attacker has physical access to the transmitting or receiving infrastructure.

2. The second way is that a secure connection occurs, not between the user certificate and the server certificate, but between the attacker and the server (hence the name MITM - man-in-the-middle attack). After introducing the “needed” certificate, the compromised traffic is available to the hacker in decrypted form, which allows credentials to be extracted and saved from it.

By the way, both of these methods are also used at the software level: when malware replaces a certificate or a software sniffer works locally.

User level attacks

Social engineering techniques, in other words, deliberate deception of the user in order to obtain credentials. The victim is misled when communicating via Internet channels or telephone, after which she herself transfers everything necessary to the attacker. Despite the large labor costs, such an attack is very effective in obtaining the account of a specific user.

Server (service provider) level attack

An extremely rare type of attack. Theoretically it is possible, but in practice it is extremely rare. Here it is worth debunking the popular myth about “the social network was hacked”: in such a situation, it was not the social network that was hacked, but the devices of a particular user. And, most likely, he himself helped the attacker in this, and the hacker used the technique from point 1 or a combination of techniques 1 and 3. Therefore, the user does not need to be afraid of such a scenario as “social networks were hacked”, but he should be more attentive to his own actions.

How to do this from your phone?

In a similar way, this can be done through system functions; then we will tell you how to find out your VK password on an Android phone. To do this you need:

  • First, go to your browser settings;

  • Select “Saved Passwords”;

  • Find the site you are looking for;
  • Next to the stars, click on the desired icon (it looks like an eye).

To avoid such problems, remember your login information or store it in a notebook. Don’t know how to find out the password for VKontakte if the page is open? To do this, you need to go to the settings of the social network, find the line with asterisks and see when the last changes were made. This may help you remember personal information.

Rating
( 2 ratings, average 4 out of 5 )
Did you like the article? Share with friends: