91% found this document useful (11 votes)
11K views10 pages

Alibaba 1

The document provides instructions for hacking into company emails to intercept payments. It discusses using VPNs and port forwarding for anonymity while hacking. It recommends tools like RDP, RAT viruses, SMTP servers, and mail extractors to infiltrate target networks and monitor transactions. The goal is to intercept payments by cloning company and customer emails, blocking their communication, and manipulating invoices to divert money to the hacker's own accounts. Several malware options and delivery methods are mentioned to potentially access targets' devices and accounts without their knowledge.

Uploaded by

nowhammie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
91% found this document useful (11 votes)
11K views10 pages

Alibaba 1

The document provides instructions for hacking into company emails to intercept payments. It discusses using VPNs and port forwarding for anonymity while hacking. It recommends tools like RDP, RAT viruses, SMTP servers, and mail extractors to infiltrate target networks and monitor transactions. The goal is to intercept payments by cloning company and customer emails, blocking their communication, and manipulating invoices to divert money to the hacker's own accounts. Several malware options and delivery methods are mentioned to potentially access targets' devices and accounts without their knowledge.

Uploaded by

nowhammie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 10

I will begin by intruducing myself,

Country :Niaja

State:edo state

Presently in lag (10years and make more money....

I hope no member will make himself a ripper her or scam anyone bcuz we are all cooked and one
blood....

THANKS

*Ali =alibaba*

*Your main aim is to enter into the mail and monitor it for when buyers are making payments。

*And the work is just all about getting company or private firms mails and hacking it

*Or any payments through mails

*Anyone transaction basically through emails

*Sometimes big companies like elevator companies,cars,truck ,lister generators and more na dos once
we dey call block for ali

*If you jam that kind box na block because the payment na block
*So let me begin to analyse each one after the other

* So now to begin you will need to have a good *vpn,

*Good

*port farwarder

*Smtp server

*Smtp domain mails

*Mail extractor

*Mail bomber

*RDP

*Rat...

Crypter......

*We all sabi vpn na....

*Make i start from port forwarding....

*So port forwarding na port wey your server fit dey report(i.e where information of the network the
come from)so it cant be track by third parties and your rat/Trojan wont be reported as a Virus...so the
target can receive and click !t

I will tell you where and how to configure all this

(Crypters very important)


*You know anytime you are using a web to browse online your data can be sniffed and gotten by third
parties(cybersecurity/Forensic agents). By the traffic from your servers do thats why the ports are
important.

As a hacker your safety is your most altimate

*Socks5 works very good than vpn .

*Socks5:

Its just that it has just one target host (i.p) and ports.

You can set it up in your browser:::::

*For mozilla firefox.....

*You go to

*menu bar -

*options-

*prefference/

*advance(depends on you version)

then click on network then click on manual config then you fill in the last column the host ip and port
then click socks5 and connect

* You can go to google.com and type in sock5 and get any strong one and configure

*Copy the ip and port and configure

*SMTP*
*SMTP server na mail servers wey mails the use relate infos

All our mails we dey use like gmail,yahoo,hotmail etc. Have their diff smtp servers.

E.g gmail smtp is 465

Like if you are using Atomic mail bomber,mailer e.t.c you will be ask to put in your smtp server from
which it will be bombing from

So you need this smtp server for mailing.

If you buy it ,it will come with a username(domain mail) and passy so you go just load am for your mailer
then click start to begin spamming your targeted mails.

Now to smtp domain mails.......

Smtp domain mails na webmail account wey you fit use spam.

If you buy good ones if can be spamming/bombing 1m per send.

*Mail extractors dey plenty for internet

*The next is mail extractor*....

I know say many of us done hear about this one to

It work: It can extract mails from url,or search by keywords.


##Like for example Atomic email Hunter

Like for example

If you out in www.google.com .

it will extract all emails from that website

Or if you type Real estate agents in usa it will fetch out emails of real estate agents in usa

Now after extracting your emails you need export it and safe it.

So you can use if to get the kind of emails from a particular company url or keyword

*Then you go to google and type in lite 1.4

*It is an extractor that helps you arrange your mails into fragments

*We have lite 1.4,1.7....

*Then i can show you another easy method to get emails from google without going using email
hunter...

Just type lite 1.4

*But that will be later

Because its all about config and settings.

*$$$The next is RDP*


*Which is remote desktop protocol.

You can connect your pc to another pc in usa and when you dey your house the work if anything
happen, and them the trace even if your vpn 4ckup and the rdp go take them go that person pc for
yankee

*Now RDP allows you to connect to anoda pc remotetly and securely.

And all evidence can prove that na that person wey dey usa dey do dey work.....

And is also good because it make your pc network looks something Original and keep you safe

*The last in the list there was Rat******

*Rat na the most important.Rat is a type of virus.Without it mehn your spamming work go turn into
business proposal instead of hacking..

*Yea for real...We get different types of rat.e.gJsockets,Luminosity

And with all this methods too you can get banks logins,cc fullz ,many infos...

But the better your virus the better the deliver in your return box.

* Virus varies in types and prices.

Return Cpanel(control panel)


I sold one of my virus 15 to all my buyers for 750k naira.

Virus dey of even 1.2m naira.

*You can through it on banks.This virus na die.

*If you throw am then the target open am , e go affect all files even flash and install itself in the client
hard disk*

We call those ones worms.

*Very expensive and rugged the only way to remove it is to burn and throw away the pc.....

* And e go the send itself to the all the client email contacts at least 50 contacts then each 50 to another
50 and so

*So thats it about the virus then.

*If you don get virus now the format to compose and how to send the virus to targets....

* If it delivers its gonna come with so many things depends on the strenght of the virus.

*You fit zip the variour or make it as a down or hyperlink/PDF so targets can find it interesting to click.

*The whenever they click and it delivers to your panel the next thing is to keep and money the box and
how to change accounts.
*The ali basically is to focus on the the company emails and monitor transactions

*NOTE: It can deliver amazon ,paypal,banks,ebay account of that particular target.

*Then when you login, you can monitor the box closely.

* Then edit it*

You dey put forwarding so all mails to that box go the enter your personal email.

And put a forwarding mail.

Then when you find good customer wey you do check their history see say transactions dey go through
you go just put filter to that customer mail.

.So all the mails wey the company the send go

that customer and all the mail the customer the send give company na you dey recieve am.

* But its better to put filter immediately company drop customer invoice(save your box)

So now you go jst chill for center as boss then if company write their customer na you go receive am
then if customer one write too na you the recieve am

*So now comes in another step

*Now you gat clone the company mail and the customer mail
*The cloning

*Then when client say him one pay that time you go don block company make the no dey see client
messge again

*So as you recieve wettin company write ,you go just sidon read am well then edit am send am dey wey
e fit favour you to client

*So all email from that contact na you dey recieve am

*So if customer say en one pay like tomorrow your go write company tell them sey na like one to
2weeks time....

*So na then you go edit the company PI put your own aza then give am to client

PI=payment information

PI :contains the company name,logo,price and total of what the customer should pay and the account
information

*So you can hold the work until anytime you wish the same client can pay and pay balance anytime.....

*So thats how ali works theorically..

* I think i have tried my best my belove Gees....


*You can also use link to spam if you neva get money for virus

You might also like