How to log into someone else's VKontakte page without knowing the password. Someone else's VKontakte page and my phone number


What is account hacking and why do they do it?

Account hacking is the illegal seizure of user data to log in to any Internet resource.

The goals of criminals can be very different:

  • Theft of funds from web wallets. Nowadays there is a lot of money circulating on the World Wide Web. Online payments take up an increasing part of financial transactions every day. So, having received Internet account data, attackers simply steal funds from these accounts.
  • Extortion . Often the purpose of hacking is blackmail. Personal data (photos, correspondence, video materials) of an intimate nature can become a reason for blackmail. This is especially true for famous people and their loved ones.
  • Sending spam . This is the most popular reason for hacking. Having taken over your account, hackers send advertising messages or infected emails on your behalf.
  • Personal motives . When passions run high, a person is ready to do anything to get the desired information. Therefore, jealous husbands and wives themselves or with outside help commit such a crime in the hope of learning about the adventures of their other half.

Sometimes accounts are hacked out of a simple prank; most often children do this to make fun of their classmates or to take revenge on the offender.

Breaking

But now we get to the less pleasant moments. Quite often, the question on VKontakte “how to access someone else’s page” implies the so-called hacking of accounts. The reasons for such a desire may be completely different, but the result will be the same. So let's now see with you what you can do if you can't wait to visit and edit someone else's profile.

The first option is nothing more than turning to special services that offer page hacking services. As a rule, they take money for their business. Not particularly small amounts, but not huge ones either. You will have to contact the hacker (let's call him that), pay, and then tell him your login, sometimes your password, after which he will ask for the page of our “victim”.

Here the question of how to access someone else’s page in Contact ends for us. After such communication, as a rule, our profile is hacked. We pay the money and are left with nothing. Honestly, a good lesson for “young hackers.” Nevertheless, users still persistently think about our topic today. There is another interesting way out of this situation. Now we will get to know him.

Hacking methods

Just like breaking into a home, an attacker can gain access to an account in various ways. Sometimes it is not one method, but a combination of several. It all depends on the skills and persistence of the criminal.

Phishing

A type of fraud when the user is directed to a fake website that exactly replicates the design of the real one. The unsuspecting victim enters his information on the attackers' website, thinking he is logging into his account.

We remove advertising on VKontakte

Typically, scammers convince the user to go to their site by sending an email “from support” asking them to confirm some action. It could also be a virus that redirects from a real service to a fraudulent site.

Password brute force

Password brute force or brute force is the most primitive way to hack someone else's account. This method can only be used when the number of incorrect data entry attempts is unlimited. The hacker's task here is to select (with the help of a program) all possible combinations of characters that make up the password.

Hacking a website and obtaining a password hash

Sometimes attackers manage to obtain a complete database of passwords for some Internet resource. They do this in 2 stages:

  • hacking a website with a hash database;
  • decryption of hashes.


A hash is a value obtained from a password using a specific algorithm. During authorization, the hash stored on the service is compared with the generated hash; if they match, access is granted to the user. The main task for attackers here is to choose an algorithm by which the hash is encrypted. In this area there is a constant rivalry between “sword and shield”.

Spyware

Such programs are usually integrated into the installation package of other programs or wait until the careless user downloads and installs them. These programs usually do not reveal their activities in any way. Their task is to quietly monitor user actions and intercept input data. There are also versions that are active, intercepting computer control.

Social engineering

It is not the hacker's talents that are involved here, but the psychological talents of the fraudster. People often choose the name of their pet, the make of their car, their date of birth, their mother’s maiden name, etc. as a password

Access to a laptop in a cafe

Many public places have open WiFi networks. And such networks have their vulnerabilities. Attackers intercept the user's cookies and use them to log into the account.

What is an antivirus - their types and purpose

Access to a computer at home or in a service

Sometimes a criminal does not need special knowledge to gain access to user accounts. This is typically used in targeted hacking of a specific user by a jealous spouse. An unattended smartphone or laptop is all that is needed to gain unauthorized access if the device is not password protected. Typically, the browser saves passwords and autofills forms when logging into your account.

How to protect yourself from hacking of a page on social networks?

There are several more methods similar to those presented above. We discussed other types of fraud, as well as ways to combat them, in the previous article. To protect yourself from them, you should be careful about the pages you visit:

  • Carefully check the URLs of pages in the address bar of your browser - there should not be extra letters or similar symbols. Compare: vk.com and vk0ntakte.ru, facebook.com and faceb00k.com, odnoklassniki.ru and odnok1assniki.ru (or in the new version ok.ru and 0k.ru).
  • Check the presence of an SSL certificate and the information in it.
  • Create a new password for each account and email. Very often, users use the same password for all resources they use. In this case, if you hack VKontakte, for example, then the scammer will be able to get into your other accounts using the same login information.
  • Avoid using public computers to access your social media accounts.
  • Set up notifications when you (or someone else) logs into your account from a public device or another device you rarely use. To do this on Facebook, go to the Facebook settings tab, then Account Settings and select Account Security. Here you can set up a feature that will allow you to track logins to your account from any computer or mobile device.
  • We also advise you to be wary of the accounts of strangers who send you friend requests. Among them there may be scammers who just want to get more information about you.

Is it easy to hack your password, or how to secure your account?

The time required to crack a password using all of the above methods, except for trying all combinations, almost does not depend on its complexity. But this method is very common and it would be a good idea to protect yourself from it. To do this, it is advisable upper and lower case characters, numbers and special characters in the password Moreover, as the password length increases, the time required to crack it increases exponentially.

Alphabet6 characters8 characters10 characters12 characters
26 characters (lowercase Latin)3-5 seconds1 hour 30 minutes67 days81 years old
52 characters (Latin in both cases)21 minutes42 days318 years981
68 characters (Latin in both cases + numbers and punctuation)98 minutes412 days4672 years28,700 years
80 characters (Latin in both cases + numbers + special characters)5 hours 20 minutes4 years 3 months28,000 years170,000,000 years

Phishing

The first and most popular method by which your mailbox will be opened is phishing (fishing or fishing). The hacker creates a special Internet page, it can very often be similar to the authorization site of mail.ru or VKontakte or some other messenger and sends a letter (bait) to the victim.

There are two types of bait letters: they can be universal and they can be individual.

Many people have probably received the universal bait - a letter arrives in which it is written that you are restricted from traveling abroad or you have a new fine from bailiffs, in general some kind of scary and interesting letter that you really want to open. This is classic phishing – a universal bait.

You open this letter, then you are asked to follow a certain link, after which you lose your password and login. The attacker receives this information.

Universal baits are good because they are sent out en masse, hackers gain mass access to mailboxes and collect a database, which they can then simply sell.

If individual study is carried out, then the issue is approached more seriously. They collect information about you, find out what you like, what you don’t like, and send you bait individually prepared for you.

It can be anything, if they find out that you are interested, for example, in horses, then they will send you an invitation to some kind of thematic festival or some kind of meeting. If you participate in a competition, you will be offered to participate in another competition, and so on. There is only one principle - they start from your desires, from what you like.

How to determine if your account has been hacked

After a successful attack, attackers do not always block the account and change passwords. In this case, there are several ways to find out about a hack.

  • Many services have account login statistics
  • Unread messages are marked as read.
  • Changing profile data.
  • Notices about blocking on social networks.

How to login officially

Everything is simple here - you need to find the desired page in the search or in your own contact list, if you are friends with the person in question, and go there to view. This is the only allowed path that demonstrates how to log into someone else’s VK.

As a guest, you will only see the content and information that the page owner has made available to visitors. That is, it is unlikely that you will be able to see hidden friends, secret music, secret photos. Of course, you will not read the correspondence and will not be able to influence the settings of this profile in any way. As they say, look, but don't touch!

To do this, you will need to fully log into VK on someone else's page (account), using the correct login and password. As you understand, this path is unofficial.

What to do if your account is hacked

Firstly, there is no need to panic and make rash decisions. Often, access to a resource can be restored.

  1. If you still have access to your account, you need to change your password .
  2. If your account is linked to your email, it would be a good idea to change the password there too.
  3. Scan your PC for viruses.
  4. If access to your account is closed, you should inform your contacts on this resource, as well as the support service .

Tracking user activity on a computer - the best spy programs

He who has information is armed. Knowing the vulnerabilities in the security of passwords, you can save them and protect yourself from hacker attacks.

Why do I end up on someone else's page? What is the reason?

Most likely, this person used to own your mobile phone number. His VKontakte page, which you find yourself on, was linked to this number. Then he did not use the number for a long time. Mobile operators sell numbers to other people when they are not used for a long time, this often happens. The number went on sale again, and in the end it turned out that the new owner of the number is you. And that person’s VKontakte page is still attached to him. But you need to restore access to your page!

When you fill out an application to restore a page, you are asked for an available phone number. You indicate it, but the VKontakte website remembers that it is linked to another person’s page. Therefore, when your application is approved, you end up on his page. It is not right. We will solve the problem.

Social engineering

Here everything is much more tricky. Social engineering is deception, fraud, it is no longer brute force.

This includes all possibilities related to deception. A person can gain your trust, somehow convince you, drug you, put you to sleep, whatever.

With the help of social engineering, on the one hand, it is easiest to gain access, on the other hand, it is more difficult, because introducing a person into a person’s social circle is a separate and rather complicated story.

The attacker must be proficient in psychological techniques and tricks, and the victim must be gullible. The approach is individual each time, an experienced fraudster can scam both a 15-year-old girl and an FSB colonel.

Hacking a phone with Cocospy

After installing the spy program, you will be able to remotely monitor all activities on someone else’s phone:

hack whatsapp, instagram, viber, facebook, classmates.

  • now all correspondence, voice messages, friends list will be available to you;
  • remotely lock the screen or the device itself;
  • hack someone else's phone camera;
  • view photos and video files taken on the device or received via instant messengers;
  • remote control of someone else's phone. By controlling the device from your online account, you can delete unnecessary contacts, block a subscriber, and track a person’s movement on a virtual map.

This is what your personal account will look like, where all the information from someone else’s phone will go:

View Demo

Corruption

I would like to complete the list of ways in which they will gain access to your email in the most common, simple Russian way - corruption.

There is nothing easier than reaching an agreement with a law enforcement officer who will write a corresponding request to Yandex, mail.ru, Rambler or another company where your mailbox is registered and, quite calmly, based on an official request, this mailbox holder (aggregator) will expose corruption corrupt law enforcement officer. Including all the information about your visits, about incoming and outgoing letters, those in the trash and even deleted ones, there is also such an opportunity.

This is a method that does not require any skill, skill, or experience; it just requires a certain administrative and financial resource.

Traffic interception

This is a rather exotic and high-tech method, which is based on hacking your Wi-Fi router. Through various manipulations or with the help of software, the attacker gains access to your Wi-Fi router and slips you another router, that is, all traffic no longer goes through your router, but through the attacker’s router.

Having the ability to filter this traffic, it can carry out an attack, the so-called MIM attack (men in the middle, man-in-the-middle attack). It intercepts cookies, intercepts the information that goes to the router, decrypts it and, posing as you, logs in to your email.

When you access your email or another site that requires authorization, you do not enter a password every time; the system recognizes that you are you. So, an attacker-hacker deceives this system and gains access to your mail, posing as you.

This is a very high-tech method, it is used infrequently when deep research is carried out on a person, but it is still worth mentioning.

Brute force

Hackers call selection of combinations brute force, but we call direct influence on a person brute force. For example, here is my phone, this phone has access to email. There is nothing easier than stealing this phone or taking possession of it in some other way.

Let's say your phone is lying on a table in a cafe, someone runs by, grabs it, opens it and gains access.

An extreme and marginal way in which they can gain access to email is if they put a gun to your forehead or a knife to your throat, and you yourself open your laptop or phone and give away access.

Brute force access is also a way to gain access to your email and password. It is used less often, but you should not forget about it.

Rating
( 2 ratings, average 4.5 out of 5 )
Did you like the article? Share with friends: