Brutus from A to Z

Carder

Professional
Messages
2,620
Reaction score
2,043
Points
113
This article is educational in nature, we do not call for anything or oblige. The information is presented for informational purposes only.

What do we need for brutus​

I will not delve into the terminology, all concepts are obvious and can be easily found in Google. I'll tell you only about the main things:
  • Proxy;
  • Base;
  • Soft (checker).
This is the basis without which it is impossible to brute. It is also desirable to use VPN and Dedicated servers.

Proxy​

The quality of your brut largely depends on them. Using a proxy is a must, otherwise you will just kill your base.

Where to get proxies from?
  • Buy;
  • Find on giveaways.
Of course, it is better to use private, purchased proxies. This will ensure that your software works well, there will be fewer passes, and there will be more profit.

However, you can live with proxies from the distribution.

There is such software, Proxy Checker from Starley, it allows you to search for valid proxies for your purposes.
  1. Download the file from the proxy.
  2. We select the type of proxy.
  3. We select the service for which you need to select valid proxies.
  4. We set the timeout and the number of threads (I personally set it as on the screen).
  5. We press the button "START".
The result is saved to the folder with the software. After that, you can use exactly those proxies that turned out to be valid for your service.

Base​

A text document that contains data.

Basic database formats:
  • mail: password
  • login: password
  • number: password

Where to get the bases?
  • Can be taken from giveaways;
  • You can dump yourself;
  • You can buy.

What are the best bases?
The bases can be divided into:

1) Valid is a database in which the password matches the soap (login, number) and according to these data you can go to any website / mail.

2) Invalid - hence the databases, according to which it will not be possible to enter the site \ mail, since the password has already been changed, or never matched at all.

3) Privat is a database that has not been leaked to the public, it is unique.

4) Public - a base that other people have already used for their own purposes, most likely they have already squeezed everything out of it.

Obviously, private validbases are most appreciated. Getting these on the free giveaways is a great success.

Software​

In short, these are programs that will process your databases.

There are a bunch of types of software, a bunch of software itself, I will dwell only on a few.

Checkers
Standard software that allows you to check your database for validity for a specific service. That is, for example, you load the database into the Steam checker - at the output you get accounts that have valid data, you can log in to them and may even take an account for yourself. The checker can also show data from accounts (friends, watch, level, rank, games, gifts, etc.)

Retrievers
A software that performs the function of a checker, but with advanced functions. Unbinding \ rebinding of mails, deleting data, removing protection. Roughly speaking, everything that needs to be done manually after checkers is mostly allowed by retrievers.

Antipublik
Software that compares your database with all databases that have ever merged into this software. Therefore, antipublic gives out the private percentage of your base. for example, you have a base of 1000 lines. Of these, 500 lines have already been merged into an anti-public. This means that the private of your base is 50%.

It is important to understand that for each service you need to use certain software. There is no one program that will check your base for Steam, VK, Instagram, Origin, etc. accounts. For each request - its own software.

How to brute?​

Let's analyze the main stages using my personal example.
  • We have a base, we have a proxy. We run the database through the antipublic, I use MYRZ. Antipublik searches for private in your database. You work with this private chat first.
  • If you have a mail: pass database, you can check it to validate the mailboxes themselves. You can use the All-In-One Checker for this.
  • We load the base and proxies, select the type of proxies there.
  • We set the number of threads (the more threads, the faster the base is checked, but the load on the computer is stronger).
  • You can set requests (the checker will look for letters from senders in the mail, or with the content that you specify to him).
  • Results are given. Hoods are valid mails, bads are invalid. The results are saved in the folder with the software.
  • Of course, it is better to buy a private letter checker, here are the two most popular options - AIO private or a letter checker from Starley. Private software is better than a crack, faster, produces fewer errors and is less likely to infect your computer with some kind of stylus.
From our original database, we weeded out private, then this private was checked for valid. Received a private valid base. Now you can run it through the checkers. Again, what I'm using is:

Steam Machine
A very convenient, simple and cool checker, albeit a public one.
If you have a login: pass database, then we simply load the database, proxies, set the streams, put the necessary checkboxes (what you want to check in the database), check the "checker" box and run it. If you have a mail: pass base - just put a tick "delete domains" and the checker will independently turn all mails into logins.

Starley's Steam Retriever
Perhaps one of the best Steam software. Explaining what and how it takes too long, there are a bunch of manuals, there is a vidos on the same site, so just know.

Wish Checker by Prince Jack
Nice software, public. Checks Wish accounts. Even with free proxies and with a base from the distribution, I found about 10k accounts with balances with it.

0af17126fd07792e27513.png


Mega Checker [byJayP]
A good mega checker, albeit very slow. In principle, checking mega is straightforward if you have nothing to do. But for someone else's purpose, it may fit.

4aeccab088b6105b90b5e.png
DARK NET

VkBrute by DarkSHA
Not a bad VK checker, but demanding on proxies.

47411fe076cf9b5132364.png


That is, in general, all the software that I regularly use.

13e68f25e17281d3694a3.png


I hope I was able to convey to you the most important basics for starting. Further it is just a matter of experience and further training. Develop - and soon you will start doing it automatically.
 
Basics of brutus and its monetization
Hello, carders! Today I will tell you about the basics of BruteForce and how you can mount this skill.

This mini course is aimed at those who are more or less familiar with such a craft as brutus. I will not advise you where to buy or take free databases from. There will not be a word about proxy, vpn. Now I would like to tell you exactly about the subtleties and tricks in Brutus that will help you protect a stolen account before it is sold, or forever, if you are interested in personal use. It is also worth noting that these tips will apply specifically to game accounts. Since I have a lot of experience in this field. But all the tips are also suitable for any service.

1) Let's say we have chosen a service for which we will mine accounts, first create your personal test account in this service/game and test mail, even temporary email. Next, our goal is to collect as many email addresses of this service as possible, from which the checker will check emails ( https://ibb.co/fTH9jm (not advertising)). Regress - we received an email from one mail from the service, click "forgot password", we will receive another email from another addressee, write to support with any subject - the third one will come, if you want to leave feedback - it will come from the fourth. Next, fill them in the checker. If you come across an acc not only with a letter about registration, but also with a letter from support, then the account is most likely fat, because it would be too lazy for the owner to restore a zero account.

2) After getting access to mail, we don't immediately change the password, but just go to the service/game and see if it's worth anything...(I don't think it's worth explaining how to get access to the service/game with only mail - it's stupid to use password recovery if the password from the logs doesn't fit, and don't forget to delete traces). To speed up the process twice , we will test some logs in the service/game application itself, and others on the off-site (if you can log in). The use of multiple browsers is strictly prohibited, only tor...

3) If the account is good, then we look at whether the phone is linked to the mail, if not, then choose the service to buy an online number (forever) at your discretion, free online numbers are often always given trial for 7 days, but we need forever!. I personally bought 10 stock numbers for $ 10 and they still work ($ 10 for all 10 and all on one account)...The costs are minimal. By linking your phone number, you can easily restore your email if the owner changes the password. Too obvious, but still. After linking the phone number, we change the password from the soap and rejoice.

If the phone number is already linked, then first try to change the email address linked to the game. You can also use the game's own support service. We write that someone else is sitting on the soap, but there is no way to change the password. You usually get instructions by email, so check them out and delete them quickly...And voila, your account that you are going to sell is now linked to the left net mail.

If your phone number is already linked and you can't change your email address and you can only access your account using your username and password, then go to the game/service website and request a password change.

4) Some services/games that have android applications additionally link Gmail mail to the account, that is, you can log in to the game not only by logs, but also by gmail.

In conclusion, I want to add that all the services, mailers, and games that were discussed here are foreign, since my English is at a high level, so if I mentioned support here, then writing there in English is better, they are more loyal there..
 
[F A Q] - BRUTUS
Today we will not talk about Ancient Rome, the mass of goods with packaging, and not even about champagne. Brute-force attack aimed at hacking accounts by automatically searching through various combinations of usernames and passwords. If you are not a Vanga, then you will not be able to find the password for someone else's account with pens, but a special program can do this at least at a speed of 348 billion passwords per second (this is how four servers can bruteforce passwords on WinXP).
But Windows is not a bird of our flight, because we are interested in accounts in banks, sticks, exchanges, shops and possibly social networks or evernote - type note services. It is naive to assume that the accounts of small shops are not of interest. Especially if they store data about the CC ?
Every newbie usually asks: how do I brutalize my accounts? Where can I get a proxy? where can I download the brutus database? This article will shed some light on these and other issues

What is necessary for successful acc mining?
- Software
- Proxy service
- Databases
- A normal computer with fast internet

Software

Software is divided into 2 types:
  • Public. This type of software is written for everyone, so you don't need to pay for it. In most cases, this software is complete shit, written by a redneck coder who just installed Delphi yesterday and downloaded alphaskins, and compiled the source code in the morning before school.
    * Delphi-language, programming environment,* Alphaskins-Delphi skin system (skin for Delphi)* Source code - the source code of the program that can be compiled later* Compile - the process of converting source code into a working program (software)
    A separate case, when they put cracked software in the public, a number of such software is no worse than paid ones (For example, the steam brutus from Aniel recently worked, the cracked complex)
    Another exception is software that is laid out under Hyde or linked to a PC and access by key, when the author of the software gives you the key to the program at his own discretion.
    All available public software can be found on almost all forums.
  • Private. Many software of this kind have good functionality and speed, so they cost some money. That is, if you want to get a quick return on the money spent, then feel free to buy, but keep in mind that you also need databases and proxies that you can get for free or buy.
From all of the above, we can conclude: to get normal software, you don't have to buy it, you need to keep track of the latest cracked and public software, when the software is just released, it works almost at the level of private software

Proxy service
Again, there are two types of proxies:
  • Fast private proxies: fineproxy.org, best-proxies.ru, good-proxies.ru
    The quality is not too much underestimated, you need to take fines only if you have a lot of free time and bases for the receipt, if you only spend 2-3 hours a day, then it's better to take a cheaper option or put up a proxy for sale for 20-30r/hour (linked to the IP address).
  • Slower, but free proxies. Proxy data is posted in the public, so everyone can find it, so the load on the proxy server is higher and the receipt speed is lower.
I advise you to always look for SOCKS4 / 5 proxies, because their speed is many times higher than that of HTTP/S

Databases
These questions: where to get the base, download the base for brutus are of most concern to beginners. I will try to help you understand this.
So, there are many different ways to get mail, but I will write the most primitive of them:
1. Software search. There is UBS 3.0 (Ultimate Base Searcher) and UBS 5.0.
You can use it to get public databases. Some of them may have been checked out by very few people. It will be useful if you check all the found databases in this way for rar (rare) queries (not steam, not warfare, not origin), and depending on which databases you are looking for.
I will add: there is also RGhost Parser 3 software, you can use it to parse databases uploaded to rghost, and then check them.
2. Change domains. Quite a hackneyed topic, it turns out very little private, especially valid. You need to use it in rare cases.
And a great utility that will help you when working with databases: Text Utils Pack by Lays
3. Download databases from forums. Now they post mostly foreign bases. A bit of a chore, since you need to pump up your accounts on the forums, posting something useful from yourself. Let's say you downloaded the database from one forum. they checked it out, took what they needed, posted the same database on another forum, or distributed what they didn't need. Don't overdo it with greed. Again, it will be very problematic to get a database from us at first, but after you give something useful, you will receive gratitude for it and will be able to download databases from under Hyde.
4. The most dreary way: draining the encrypted database from vulnerable sites. Site search is done manually, but dorks are more often used: http://sqligenerator.altervista.org/
Further, to drain sites, use brains or Havij, SQLi Dumper or WebCruiser

Patience and fat bases to all ?
 
  • Like
Reactions: Man
Top