Friday, May 27, 2016

Using Xhydra to AIM (Aol Instant Messenger) screen names.

I rlly Love Backtrack 5 and all the tools it comes with, Metasploit, Xhydra, Nmap, some of the most popular. But there's nothing i enjoy more than the feeling of success, the feeling you get when your hard work finally pays off, and the goes through. I had a lot of fun doing this as a pentester back in my younger days. i was surprised at just how sy it was to get peoples s using a brute forcer and the right server configuration. i was popular on AIM. i had over 160 friends, and what that mnt is that i had over 160 active screen names to try and get the to!
Here's how it's done.
Fire up a terminal, zenmap and Xhydra

ping your output should look like this:
In some circumstances the IP address will be different. i will supply you with the correct one; but hypothetically any IP address will work

step 1. ping (

step 2. port scan the IP address and verify port 587 (SMTP AUTH) is open

step 3. input data into Xhydra
-target tab-
single target:
port: 587
service: smtp

- tab-
username: programmerdemon (or any screenname)
: list (i have my own)
*others can be found in /root/pentest/s/wordlist/
*or Here

-tuning tab-
about 8 tasks should be fine


it was my screenname so i didn't show the . also, you may want to use a proxy. any questions don't hesitate to email.

No comments:

Post a Comment