catch_thousands_of_logs
catch_thousands_of_logs
By luffy114
Introduction:
                          Let’s go!
                       Summary:
I) Necessary vocabulary
– Each combolist must be chosen according to the site where one wants
   to crack accounts, one must know if the connection is established via the
   bias of a pseudo or an email. Later on you will learn
   how to obtain combolists but I can mention a few
   interesting software:
– Configs
   Configs are files with the .ini extension. These files are
   usable on the Sentry MBA software that you will need during
   this ebook. These are therefore files that allow for brute forcing
   accounts on a site of our choice. Each site has its own configuration that
   it can vary itself. They can be done manually or
   found on the internet.
– Dorks :
Example of dork:
                      inurl:"index.php?id="
                                                II) Necessary Software
First of all, it is important to know that you should never run these software.
on your real computer, SQLI Dumper for example is known to have a
backdoor in its version 7.0 and 8.0. The best is to execute all of this on a
Virtual Machine or on a Windows VPS (which will also improve your
connection). However, if you purchased this Ebook from my shop
Know that the software Sentry MBA provided for download with the send is safe.
99%!
          SQLI Dumper is an all-in-one tool that searches for websites using Dorks.
          check if they are injectable and exploitable, and export databases.
          It will allow us to obtain, as previously mentioned, combolists.
          Fresh.
          Sentry MBA is the software that will allow us to have logs, sound
          The principle is simple; using proxies, it will simply test the
          accounts from our combolist one by one and then give us back those that
          are sold as hits.
          Easy Dork Builder will allow you to create your own dorks.
          easily.
This list of software is basic; later it will be up to you to adapt and find new software that will suit you.
Even more, however, to start this list of software will suit perfectly!
              III) Easily obtain proxies (site + software)
http://free-proxy.cz/
 It is completely free and doesn't even offer any paid plans at all.
                                is available.
Step 1: Sign up
Carefully select these options then click on Start, wait for the end
Then click on Save List, there you have obtained your list of proxies!
        IV) Presentation of dorks, how to obtain and create them
First of all, it is important to know that dorks can be found almost anywhere, nothing
by doing a Google search, you can find a large list. But if
 you took a list of dorks from a site and well know that this list probably
already been exploited many times and therefore the sites that you will find
                      have already been done and redone and even shared!
The dorks have a particular shape, I will show you a basic example and
                     explain how it works:
inurl:"index.php?id="
 indexDesignates the name of the page, index means the 'primary' page so the
       most important and the most widespread, this term is therefore widely used.
   First of all, please leave all the boxes unchecked, SQLI dumper is
                                 charge these options.
The first column refers to the main term contained in the URL, like you
 You can see it in the image, most of the terms are in English and that's all.
the interest, if you modify these terms by French terms, well you will have
   much more French sites to exploit or else complement it with
                          new ones if you find them.
                       view becomes see
 The 4th column refers to the id or category, for my part I put 1 2 3 4 5 and
                It's settled, but you can very well vary!
      Then, click on the green button and retrieve the list of dorks!
               V) Obtain combolists with SQLI Dumper
Now that you have all the necessary 'tools', it is time to move on.
          at the biggest part of the work, SQL injection with SQLI dumper.
We stick the dorks in the surrounding area and then we click on the button as well.
surrounded. Then we wait for the end of the scan and move on to the next step.
                         Step 3: And we rescan!
We click on the 'injectables' tab and then on the 'start analyzer' button.
       We are waiting for the end again and moving on to the next step
        Step 5: Knowing if the sites are interesting to inject.
Right click in the sites area and then left click on 'select all'.
       Then in the bottom right we click on the "start" button.
Then we wait for the end of the loading, which will take more or less time depending on.
from what you wish to extract, it is the longest moment so let it be
                       turn your computer.
 After that, we save where we want and wait for the loading to finish.
          There you go, it's done, your combo list is ready to be exploited!
              VI) Organize your combolists with Notepad++
To organize your combolists, nothing is better than Notepad++, this very software
 complete will allow us to eliminate duplicates as well as organize the
                       "Email:Pass" from A to Z.
Install the
Then click on: TextFX > TextFX Tools > Sort Lines Case Sensitive
      And there you go, your Combolist is organized and ready to be used.
                  VII) Use Sentry MBA and obtain logs
 The time has come! Here is finally the long-awaited moment, the one to obtain logs.
 thanks to Sentry MBA. First of all, it is important to know that this software, like all
 Those who provide logs are based on patience. You will therefore have
need to keep your computer running for a longer or shorter time depending
  of your expectations, the length of your combolist, or the site's security.
                                  Here we go!
Step 1: Choose the configuration and thus the site on which you want logs
            Settings>General>Load Settings From Snapshot
And now we let his computer run, I will explain to you how to
                   What does each section correspond to.
    First of all, as you have seen, a small 'box' opens when you
 click on 'Start', this box is very important to know how much code
                 you have forced and followed the course of your cracking.
"Hits" means the number of accounts you have obtained, in this case.
                              I obtained 7.
 "Reds" means that at the time of authentication the account was redirected to
                                   a page
   "Tested" means the number of "Email:Pass" tested and therefore the number of accounts.
                              potentials.
 "Retries" means the number of accounts that failed to be tested and therefore
                           who will be retested.
Active means the number of proxies that are active and not banned.
"Codes" means the codes encountered when an account is tested, quite useless.
but still allows you to know if a configuration is dead by looking for the
                                code on Google.
  To recover the accounts, go to the 'Box' at the bottom, that is where they are
               display the accounts that work and the others.
Then you need to select all the accounts and right-click on them, this
a box should appear. Now just click on 'Copy Combo'
    ToClipboard» and then paste it into Notepad++, for example.
  «Bots» means the number of accounts tested simultaneously, the more the site is
  it's safer, we need to lower it. Since Cdiscount is crap, we can...
                              allow the 110 bots.
«Wordlist Position» means where the cracking stands, for example, I am currently at
                           287th "Email:Password".
Then the percentage bar means the percentage of tested accounts for me.
                              part is 100%.
                Bonus: Decrypting passwords (MD5)
b6edd10559b20cb0a3ddaeb15e5267cc
This means that they are encrypted, most of the time they will be in this form.
     this encryption is called MD5 and, good news, it can be reversed.
The site:http://finder.insidepro.com/
 With this site, nothing could be simpler, paste your encrypted passwords into the box
provided for this purpose. Then, click on Search and the site will try to find
                 for you, the result will be in this form:
password
 There is also another solution, the ORHT software. This software will attempt to
             find your password from different sites.
To know how to use it, all you need to do is watch this YouTube video:
I am not going to give you a detailed explanation because creating Sentry configs
          MBA varies greatly depending on the site's security.
          Thank you for purchasing this ebook, I hope you liked it.
                               Safe travels, luffy114 !