Cookies — encrypted text documents that store basic information about the user who uses the browser. This information includes usage statistics browser, personal settings, stored logins and passwords and more.
Hacking cookies is theft (or “theft”) session of the visitor of a web resource. Locked the information becomes available not only to the sender and the recipient, but a third party — the person who carried out the interception.
How to do it
On the drive create 2 text files. The first called “autorun.inf” and the second “stealer.bat” *.bat — an executable file extension. Ie it can be used as a program*
In the first, append the following lines:
The first file is responsible for startup Stiller.
Then “hide” the resulting files. Their cookies on YOUR computer removed, or throw the stick. And in their place the copied received.
Now download WebBrowserPassView. You can use a portable version. No need to press anything in this program: it loads and decrypts the cookies from your browser. Don’t forget to replace your files have been received!
In Windows 10 (and 8) our autorun doesn’t work, there is the possibility of a common disabled. So you’ll have to come up with a way to access the computer and handles to run the file stealer.bat, since the process takes very little time, and come up with an excuse to sit down for a moment at someone else’s computer, many do not mind.
If suddenly who does not know where are stored the cookies, here’s a hint:
C:UsersПользовательAppDataLocalGoogleChromeUser DataDefault (or Profile 1)file “Cookies” without extension
Storing credentials in cookies is not very safe, but at the same time the most familiar and intuitive way for most inexperienced users. Like most, I use almost all the basic options for storing credentials websites:
Cookies the number of secondary sites that are not related directly to my identity.
Password managers of browsers where I need synchronization between multiple devices, including cross-platform.
A local password ManagerKeePass under the long master password for the most important credentials, if compromised, can cause a blow to my reputation or endanger visitors to my sites.
Authentication through social networksand lately prefer this method.
Since the purpose of this post is not stealing others ‘ mailboxes, logins accounts and other data or gain access to them, the story will end. But with the help of special programs and social engineering can replace your cookies to strangers and to access others ‘ personal data. In General, if the attacker will illuminate the purpose, he will find the use of the information received.
Now that you know how can steal your passwords and logins. Be careful and don’t let their computer with other people.
WARNING! All links in the articles may lead to malicious sites or contain viruses. Follow them at your own risk. Those who purposely visit the article know what they are doing. Do not click on everything thoughtlessly.
All information posted has been taken from public sources and is provided for information purposes only and does not constitute an invitation to action. It was created only for educational and entertainment purposes. All information is intended to protect readers from illegal actions. The visitor undertakes all possible losses caused. The author does all actions only on his own equipment and in his own network. Do not repeat anything read in real life. | Also, if you are the rightholder of the material posted on the pages of the portal, please write to us through contact form complaint about the removal of a particular page, as well as read instruction for rightholders of materials. Thank you for understanding.
We are not against any use of materials, but when you specify an active link to our site. Be sure to share records on social networks - let's develop our cozy service together!
This is an open platform for viewing and publishing a variety of information about PCs, operating systems, gadgets such as Android and Apple, and more!
Connect with us
To contact us, you can write to us at the e-mail address specified in the section "contacts".