SlideShare a Scribd company logo
Find this article and more cool stuff on
www.hackstories.com
How to hack a Gmail account : USB Password Steal
2015-12-04 21:12:26 Hackstories
Today we are going to learn how to hack a gmail account using a method
known as USB Password Stealing. It involves hacking gmail password of the
victim on inserting our USB drive into the victims computer.
It’s early in the morning and i can’t sleep so i thought i should write something
on gmail password hacking for you guys. First of all i should tell you what is
awesome about this gmail hack –
You don’t need any prior knowledge of programming language just the
ability to take risks and a quick brain.
You can not only hack gmail accounts with this method but also hack
Facebook passwords,WiFi passwords,hack twitter passwords or any
kind of password that you can wrap your mind around.
OK so without wasting any more time lets get started.
Point of Vulnerability
We are going to exploit the habit of humans to save their email and
passwords on the browsers so that they don’t have to login again and again.
This bit of laziness is going to help us use our files to hack their gmail
password.
Click on the image to enlarge it
USB Password Stealer – Step 1
So the first thing you will need is a very cheap USB/Pendrive ( a CD would do
the work too but ill recommend USB drive as you can remove it quickly)
Now i am going to give you 5 files. I want you to put them in a folder and copy
them in your Pen Drive.
Download link : hackstories.com/files/password_stealers.zip
Important Note : Now if you have any kind of anti-virus installed it will show all
these files as virus. Now don’t worry these are not actually viruses they are
just Hack Tools so your computer sees them like a threat. But hey we are
just Hack Tools so your computer sees them like a threat. But hey we are
threatening someone else right? So instead of removing or quarantining. Allow
them like i have in the image below or just disable your anti-virus before using
these tools. Trust me on this one.
What do these files are for bro?
I am going to explain for what these files are for individually so you have a
clear understanding of whats happening.
ChromePass – It is a small password tool that allows you to view the user
names and passwords stored by Google Chrome Web browser. For each
password entry, the following information is displayed: Origin URL, Action URL,
User Name Field, Password Field, User Name, Password, and Created Time.
Protected storage pass viewer(PSPV) – Protected Storage PassView is a
small utility that reveals the passwords stored on your computer by Internet
Explorer, Outlook Express and MSN Explorer.
Mail PassView – Mail PassView is a small password-recovery tool that
reveals the passwords and other account details for Outlook
express,windows mail,POP3 etc
PasswordFox – It is a small password recovery tool that allows you to view
the user names and passwords stored by Mozilla Firefox Web browser. By
default, PasswordFox displays the passwords stored in your current profile.
Launch.bat – It is batch file i created so that when this file is executed all the
files given above get executed simultaneously. So it saves a lot of time when
you are hacking into your victims computer.
Testing
Now for testing you need to open the file called ‘launch.bat‘ by double right
clicking on it. You will see that some text files have appeared where the
original files were present. I want you to open all of them one by one. You will
see all the passwords that you had stored in your computer are now in those
text files.Hurrah! So it’s working. Now we have to find a way of executing them
on your victims computer.
Social Engineering – Step 2
Now step-2 is basically how you can run these files on the victims computer.
That is called social engineering. Manipulating situations to get a desired
result. Now i am going to give you a scenario how i used my USB Password
Stealer to win a bet!
Once upon a time in a galaxy far far away my room-mates had bet me quite
some money to hack their gmail accounts. They knew i had some experience
in gmail security and hacking but they were pretty sure that i wouldn’t be able
to do it. Challenge Accepted!
So what i did was i waited to get physical access to there computers. I got an
opportunity when they all went to have food in the mess and i made an
excuse that my tummy was already full. My intent was to stay behind and
hack there gmail accounts. After they had gone i quickly opened there
computers. Most of them didn’t have passwords on there windows machine
so they opened easily but one of them was password protected so i had to
hack his windows password and then i got access to his computer too.
Note : If you don’t know how to hack windows password. You can learn it from
the link – Hack Windows Password
Now i first disabled the anti-virus of the computer and then inserted my pen
drive into the computer and opened ‘launch.bat’ which opened and the text
files containing all the passwords including the gmail passwords were
generated.
Important Note : If the victim has some kind of anti-virus installed or has
windows defender activated (which probably is ) you need to allow the files or
disable the anti-virus before clicking on ‘launch.bat’ . If don’t know how to allow
files just search for this on Google “How to allow files in ANTI-VIRUS NAME”.
After that i just took out my Pendrive and copied the text files to my
computer. Then i repeated this whole process with all the computers in my
room, in the process hacking gmail accounts of all my friends.
The End
That’s all people. Hope you like our post on ‘How to hack a gmail account’. If
you have any doubts or just want to show your appreciation for this post
make sure to comment below and we will get back to you as soon as we can!
We also have a shit load of awesome hacks that we can’t disclose in public.
So if you want those and a lots of other free ebooks make sure you become
our True fan.
and yeah i almost forgot..one last thing..
Share the love
More from my site
Facebook Hacking : Using a Keystroke logger
Get Free Twitter Followers : The Ultimate hack
The smart way to get YouTube subscribers for
free
Hack Windows Password: No more fake shit
Increase your facebook likes: The coolest hack
ever
Hack college website and change your grades!
Hacking into a girl’s Facebook using a Nokia Phone
Here Let me Google that for you Bitch
A Super Method to Hide Porn
Deep Web : The secret you wish you didn’t know
Share this:
Facebook
Twitter
Google

More Related Content

Recently uploaded

Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
ssuser13ffe4
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdfIGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
Amin Marwan
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
Chevonnese Chevers Whyte, MBA, B.Sc.
 

Recently uploaded (20)

Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdfIGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
 

Featured

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
Skeleton Technologies
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
SpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
Christy Abraham Joy
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
Vit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
MindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
GetSmarter
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
Alireza Esmikhani
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
Project for Public Spaces & National Center for Biking and Walking
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
DevGAMM Conference
 

Featured (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

Hacking gmail password using tool called USB Stealer

  • 1. Find this article and more cool stuff on www.hackstories.com How to hack a Gmail account : USB Password Steal 2015-12-04 21:12:26 Hackstories Today we are going to learn how to hack a gmail account using a method known as USB Password Stealing. It involves hacking gmail password of the victim on inserting our USB drive into the victims computer. It’s early in the morning and i can’t sleep so i thought i should write something on gmail password hacking for you guys. First of all i should tell you what is awesome about this gmail hack – You don’t need any prior knowledge of programming language just the ability to take risks and a quick brain. You can not only hack gmail accounts with this method but also hack Facebook passwords,WiFi passwords,hack twitter passwords or any kind of password that you can wrap your mind around. OK so without wasting any more time lets get started. Point of Vulnerability We are going to exploit the habit of humans to save their email and passwords on the browsers so that they don’t have to login again and again. This bit of laziness is going to help us use our files to hack their gmail password. Click on the image to enlarge it USB Password Stealer – Step 1 So the first thing you will need is a very cheap USB/Pendrive ( a CD would do the work too but ill recommend USB drive as you can remove it quickly) Now i am going to give you 5 files. I want you to put them in a folder and copy them in your Pen Drive. Download link : hackstories.com/files/password_stealers.zip Important Note : Now if you have any kind of anti-virus installed it will show all these files as virus. Now don’t worry these are not actually viruses they are just Hack Tools so your computer sees them like a threat. But hey we are
  • 2. just Hack Tools so your computer sees them like a threat. But hey we are threatening someone else right? So instead of removing or quarantining. Allow them like i have in the image below or just disable your anti-virus before using these tools. Trust me on this one. What do these files are for bro? I am going to explain for what these files are for individually so you have a clear understanding of whats happening. ChromePass – It is a small password tool that allows you to view the user names and passwords stored by Google Chrome Web browser. For each password entry, the following information is displayed: Origin URL, Action URL, User Name Field, Password Field, User Name, Password, and Created Time. Protected storage pass viewer(PSPV) – Protected Storage PassView is a small utility that reveals the passwords stored on your computer by Internet Explorer, Outlook Express and MSN Explorer. Mail PassView – Mail PassView is a small password-recovery tool that reveals the passwords and other account details for Outlook express,windows mail,POP3 etc PasswordFox – It is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile. Launch.bat – It is batch file i created so that when this file is executed all the files given above get executed simultaneously. So it saves a lot of time when you are hacking into your victims computer. Testing Now for testing you need to open the file called ‘launch.bat‘ by double right clicking on it. You will see that some text files have appeared where the original files were present. I want you to open all of them one by one. You will see all the passwords that you had stored in your computer are now in those
  • 3. text files.Hurrah! So it’s working. Now we have to find a way of executing them on your victims computer. Social Engineering – Step 2 Now step-2 is basically how you can run these files on the victims computer. That is called social engineering. Manipulating situations to get a desired result. Now i am going to give you a scenario how i used my USB Password Stealer to win a bet! Once upon a time in a galaxy far far away my room-mates had bet me quite some money to hack their gmail accounts. They knew i had some experience in gmail security and hacking but they were pretty sure that i wouldn’t be able to do it. Challenge Accepted! So what i did was i waited to get physical access to there computers. I got an opportunity when they all went to have food in the mess and i made an excuse that my tummy was already full. My intent was to stay behind and hack there gmail accounts. After they had gone i quickly opened there computers. Most of them didn’t have passwords on there windows machine so they opened easily but one of them was password protected so i had to hack his windows password and then i got access to his computer too. Note : If you don’t know how to hack windows password. You can learn it from the link – Hack Windows Password Now i first disabled the anti-virus of the computer and then inserted my pen drive into the computer and opened ‘launch.bat’ which opened and the text files containing all the passwords including the gmail passwords were generated. Important Note : If the victim has some kind of anti-virus installed or has windows defender activated (which probably is ) you need to allow the files or disable the anti-virus before clicking on ‘launch.bat’ . If don’t know how to allow files just search for this on Google “How to allow files in ANTI-VIRUS NAME”.
  • 4. After that i just took out my Pendrive and copied the text files to my computer. Then i repeated this whole process with all the computers in my room, in the process hacking gmail accounts of all my friends. The End That’s all people. Hope you like our post on ‘How to hack a gmail account’. If you have any doubts or just want to show your appreciation for this post make sure to comment below and we will get back to you as soon as we can! We also have a shit load of awesome hacks that we can’t disclose in public. So if you want those and a lots of other free ebooks make sure you become our True fan. and yeah i almost forgot..one last thing.. Share the love
  • 5. More from my site Facebook Hacking : Using a Keystroke logger Get Free Twitter Followers : The Ultimate hack The smart way to get YouTube subscribers for free Hack Windows Password: No more fake shit Increase your facebook likes: The coolest hack ever Hack college website and change your grades! Hacking into a girl’s Facebook using a Nokia Phone Here Let me Google that for you Bitch
  • 6. A Super Method to Hide Porn Deep Web : The secret you wish you didn’t know Share this: Facebook Twitter Google