Awani Review

Complete News World

logiciels

Here is the software hackers use to steal your passwords!

Hackers use different programs to be able to steal your passwords. But some are more famous than others. In fact, with these programs, they can steal your passwords for resale or otherwise. It is also one of the most common cyber crimes. Thus, according to studies by Digital Shadows, you will still be more than 24 billion passwords/usernames allegedly stolen In just six years.

Generally, they are resold and end up in hacker forums or illegal stores. We will introduce you to the most used software to steal your data and how it works, in this way you will be able to Better protect yourself. We will explain everything here.

Flight programs.

As a scam method in the internet world, we are now finding more and more phishing, or phishing in french. The concept is very simple: to lure victims to do a certain action. in general is Click the link. But there are other ways for them to achieve their ends.

Redline

Readline is one of the programs that can suck your data. Since phishing doesn’t work every time, definitely thanks to all the awareness about this scam technique. Hackers have no choice but to innovate. Thus, they invest nearly $200 to acquire the Redline Information Stealer. This allows you to get the computer code Harmful Who totally steals all passwords stored on the system targeted. It’s very simple, often sent by booby-trapped messages like a extension Excel (XLL).

His way of doing it is also very simple. Once on the computer, the program searches for it completely. It’s basically the data from web browsers that this code will look for, because that’s where most of the data is. But in addition to that, Redline recognizes the presence of an antivirus, so it is Adapt your strategy to operate in a more complex way. If he achieves his goals, he has won everything.

Stuffing OpenBullet Credentials

This program is actually quite ingenious. When a hacker manages to get a site’s ID and password, it will also look for whether This same duo won’t work Not Elsewhere. In fact, many people always use the same duo on all sites, which is practical for hackers. But of course they won’t do it manually.

See also  Ubisoft quietly revealed the release date of Rainbow Six Extraction

That’s why OpenBullet exists. It automates connection experiences across multiple sites to find the best place to work. They often use proxies that allow hiding and changing their location So that every attempt is more secretive.

If this program was free, it was At first for safety. It was used to facilitate penetration testing. But to make it work well, you have to do it Well configured. In fact, the program should know where to enter the binary username/password. But also that he realizes when he fails or not.

HashCat theft software

But sometimes, despite the software, hackers can’t steal. So instead of stealing information or cryptocurrency, they will do it Take the fingerprint. And hash means hash in English. It’s a rather complicated way of pretending to know the password, but without actually knowing the input. In fact, no system should keep raw passwords, it should keep fingerprints. but Search for the password With only footprints, he It requires a lot of arithmetic operations, This is not really easy.