Friday, May 27, 2016

Using Xhydra to AIM (Aol Instant Messenger) screen names.


I rlly Love Backtrack 5 and all the tools it comes with, Metasploit, Xhydra, Nmap, some of the most popular. But there's nothing i enjoy more than the feeling of success, the feeling you get when your hard work finally pays off, and the goes through. I had a lot of fun doing this as a pentester back in my younger days. i was surprised at just how sy it was to get peoples s using a brute forcer and the right server configuration. i was popular on AIM. i had over 160 friends, and what that mnt is that i had over 160 active screen names to try and get the to!
Here's how it's done.
Fire up a terminal, zenmap and Xhydra

ping smtp.aol.com your output should look like this:
In some circumstances the IP address will be different. i will supply you with the correct one; but hypothetically any IP address will work

step 1. ping smtp.aol.com (64.12.175.136)


step 2. port scan the IP address and verify port 587 (SMTP AUTH) is open


step 3. input data into Xhydra
-target tab-
single target: 64.12.175.136
port: 587
service: smtp



- tab-
username: programmerdemon (or any screenname)
: list (i have my own)
*others can be found in /root/pentest/s/wordlist/
*or/root/pentest/s/john/.lst
*or Here



-tuning tab-
about 8 tasks should be fine

-start-


it was my screenname so i didn't show the . also, you may want to use a proxy. any questions don't hesitate to email.
Thanks!

No comments:

Post a Comment