It explains all.
https://www.nulled.t...endly/
-
Hello everyone and welcome on my new Nulled.to guide.
In this guide, you will clearly learn ALL the things you need to crack accounts.
That guide took me a long long time to write and so many more times to understand all the things I’ll try to explain you now.
Don’t forget to support all the guys I will refer to during the guide, for their hard work and their quality.
So, let's start with a summary:
1. What will we do ?
In this tutorial, we will learn how to recover combos from databases. We will use a method to have private combos, so that nobody uses them and that they are of good quality. To do this, we're not going to use crappy programs like Slayer Leecher or things like that, which get public combos from shared lists.
Here we will build our own dorks, to inject interesting databases (where 'targeted' users are located for what we are looking for).
It's a long process but it pays.
It also requires investment, in money and time.
I am on mac for example and it is impossible for me to crack anything from my mac. So I have to invest in a rdp to crack.
Now that we have seen the basics of what we are going to do, let's learn how to do it!
2. How to do it?
a. DLL programs
b. Dorks: What are they? How to make good ones?
This is one the most important part of the tutorial.
If you have good dorks then you will have good injectables.
If you have the injectables you have the dbs and in the dbs you have the combos.
You have three big different ways to have dorks:
• Generate ones from generators
• Handwritten (those are the bests)
• Bought one
The problem with generated dorks is that they will give you a lot of urls, but a lot of them will be shit ones. So your results will not be as much HQ as you attempt to.
If you do handwritten dorks then you will have exactly what you’re looking too.
I will not explain all the methods because other members did it before me and they explain it very well.
For handmade dorks, I will recommend you some tutorials too.
Follow them carefully and you will have awesome results, really.
c. Dumping: SQLi Dumper / Sqlmap
First let’s start with SQLi Dumper.
SQLi Dumper is a nice program because it’s really easy to use.
The problem is that it’s quite slow (compared to map).
Here are the steps to have urls from the dorks you made :
Now you are done, let’s just go to d.
(If you use SQLi Dumper don’t check this part)
So guys, now we have our combos, let’s just dehash them !
d. Dehashing
As always you have three methods to dehash :
- Use shitty programs like OCRHT
- Use Hashcat
- Pay a dehasher
Basically, what you will need to do is to put you hashes in a file, run the program you want, and let it dehash.
That’s really a simple part but it’s as always, a long process (depends on your comboslist size).
Here are tutorials on how to dehash :
e. Checking privacy
First of all, why are we checking the privacy of our combos ?
That’s simple, people will buy from you because no one (exepct the owner) will use the account they bought with them.
If your combos are public ones, you will sell them but you will have to replace / refund your customers a lot of times.
Moreover, you’re in obligation to set low prices, because your accounts are not safe.
See: Is it better to open a multi accounts shop 1$, where you pass 24/7 to refund guys, or to open a professional Spotify / Netflix store, where you can sell your accounts for 5$ ?? Choose the good one
SO, to check the privacy of your accounts (and the quality of your previous process so ), let’s use Anti-Public programs.
Upload your base and run it.
Now we have our combos, and now we know our combos are private, we are ready to open a checker and put them in.
f. Checking
Choose behind those 3 checkers:
For beginners, I strongly recommend to use Snipr.
It’s an easy program where you can grab your proxies, make combolists and run your checkers.
I personally used it but now I’m over with this tools, which has, as all others, so cons.
If you want to use Snipr, let’s follow my tutorial :
If you want to use Storm, follow @
For Sentry MBA : @mo0pleT did a simple and clear tutorial, check it out there :
You can also use simple checker for only one module, but most of the time they are not really optimized for multi threads and they eat most of CPU.
So guys we are done? You have now combos you can resell or post on nulled.to to reach legendary
3. Hall of fame
I need to thanks all those guys for their work and most of them for they sympathy.
As I always say, it’s really rare to find skilled guys who are cool.
And they are.
Big shoutout to this HQ pleb
@
4. Conclusion
I hope this tutorial, or this generalization of tutorials will help you to finally stop asking every time ‘how to crack’ and ‘how to have accounts’ because YOU CAN DO IT and everyone can do it.
What you need is to be organized and ‘clear’ in your head to firstly know what you want to do, and after do it well.
I will continue this tutorial with time, and if I see that people are happy to see that kind of shit here.
Edited by CHAO, 01 July 2023 - 05:33 PM.