This post is written for the rookies who support this section! A lot of people asked me how to steal QQ numbers. In fact, it's a very simple trick. I'm also a rookie, and I wrote down my own ideas for everyone back then. However, I don't like stealing accounts, nor do I randomly change others' QQ passwords. I hope that after you learn this, you just play with it and don't randomly steal other people's numbers! Moreover, don't use QQ to spy on others' privacy or threaten others! Stealing QQ numbers can be done in several ways: keyboard recording Trojan theft; brute force cracking; and other intrusion methods to obtain. Here, I will focus on explaining the method of keyboard recording Trojan theft.
One: To plant a Trojan, first check if the target has a restore protection. If they do, our efforts might go to waste, haha. If you know their restore method, you can adopt corresponding strategies to crack the restore. If the target uses soft restore (i.e., restore software), we can find tools online such as many recovery wizards that counteract soft restores. For hardware restores, if the target uses a small sentinel or Hua Su, we can use "Kill Restore Card" to disable it. If it's something else, we can remove it using pure DOS commands.
Specific steps are as follows: Press F8 during startup to enter the pure DOS environment. When the prompt c: appears, type c:\debug, then follow these instructions:
- a100
- xor ax,ax
- int 13
- int3
Afterward, input 't' and press Enter, repeating until the displayed address is similar to F000:xxxx. The following command is: mov dl,80 (practice your eye skills). Press 'q' to exit. Note down this address and fill it at (0:13H*4)=0:4cH. For example, if my obtained address is F000:9A95, run debug again and type:
-e 0:4c 95 9A 00 F0
The function of 'e' is to write the data table "95 9A 00 f0" into the bytes starting from address 0:4c. -q
Note: Be careful when filling, as a wrong entry may cause a system crash. Okay, the crack is complete. Now, at the prompt c:\, type c:\win to enter the Win98 system. This time, all your actions in the Win98 system will be stored by the restore card upon the next start-up. However, the next time you enter the system, you need to rewrite the address 0:4c to allow the restore card to store your stuff. At this point, just enter debug under pure DOS and type -e 0:4c 95 9A 00 F0 -q. After restarting, the restore protection has been removed, and we can proceed with planting the Trojan.
Two: Choose a Trojan. There are many Trojans specifically designed for stealing QQ numbers available online. You can select one from the main station of this forum. Common ones include Aladdin Thief, QQ Killer, Simple QQ Thief, QQ Password Messenger, and many QQ fraud-related ones... You can choose freely based on your needs.
Three: After downloading and unzipping, fill out the Trojan file. Generally, most Trojans have ASP space collection and email password collection options. We can opt for email collection, fill out the required information to generate the Trojan, and select the option to automatically delete after running. Once run, the Trojan is successfully planted, and you just need to wait for someone to get hooked.
Four: For non-local thefts, we can use software bundling to deceive. As for bundling tools, you can choose from this site or download from elsewhere. Bundle the Trojan with normal files and place them in your shared folder, waiting for someone to download and get hooked. Alternatively, send via email, or join a few groups and hang them in the group shared space waiting for others to download. These methods are all good choices.
That's all. After completion, just wait for someone to get hooked. Check your mailbox, are there many "gifts"? Haha.
Original content by a rookie for learning and exchange purposes. Any mistakes, please kindly point out by experts!