Simeon recently saw a website on the Internet that claimed to be able to crack any mailbox. I am very curious. As far as I know, the mailbox is not so easy to crack, but out of curiosity, I still want to know what technology the other party uses. Is there a new technology for mailbox cracking recently? with questions, I began to analyze and sort out the information on my website, I downloaded a "email password cracking magic book" from my website, and analyzed and researched it. Below are some of my operation steps and ideas, write it out and share it with you. (recently, the legendary mouse hand cannot be used for mouse and keyboard operations for a long time. It is very depressing. I don't know if you have any good solutions !). (1) anti-virus first, my anti-virus software is avast !, Although the effect is not as good as that of red umbrella, the vast majority of viruses can be detected and killed. The vast majority of software obtained from outside are insecure, and Trojans and advertisement software are bundled. Therefore, anti-virus processing is required first, check whether anti-virus software can detect viruses. Of course, you can also manually analyze the security of software by using tools such as file monitor, process monitor, and Network Connection Monitor, I usually put the software into a virtual machine for testing and analysis, even if the problem does not matter. Expected results are: 1, avast! The system prompts that a virus exists. It is an advertisement virus. I just want to see the specific content in the "email password cracking magic book", so I didn't analyze the software for viruses, I have attached this executable ebook to the attachment. You can analyze it by yourself. Figure 1 use avast! Scan and kill e-books (2) execute e-books and view the content "email password cracking magic book" is based on executable files, there are generally three types of e-books, the first is to execute the exe file directly, and the second is the chm file, which everyone is familiar with. The most common e-book format and the third is the general e-book format, for example, pdf, pdg, and cai. E-books of the Exe file type must be especially careful. They are the best carrier for bundling Trojans. Open the "email password cracking magic book" and you can see that the book is running normally. Before running the book, you also visit the website of the e-book. There are five contents in the book, as shown in 2, the file is made of word. Figure 2 View "email password cracking magic book" (3) copy file content because I have not installed the printer driver in the virtual machine, and most common users have not configured the printer in their homes, there are not many things to print. You need to copy the content of the file according to the desired file format. By trying, you can select the file content for copying, it means that the copied content cannot be pasted in notepad or word files. Many other methods have been tried, and the selected content cannot be copied. A clipboard management program is found later, I want to use it to obtain the pasted content. Although yes, the format has changed and the effect is not very satisfactory. I suddenly thought that since the file is opened by a word file, will it generate a word temporary file. It is very likely that the "dir *. doc/s" file will be generated directly under dos, as shown in figure 3 and figure 4, and the "“temp13.doc" file will be generated in the temp143737186988911890705directory. Figure 3 obtain the word temporary file generated by the e-books. Figure 4. Documents. By opening different files and observing the temporary file directory, we found that the temp * folder file is generated in the temporary directory when the e-book is opened, when a new file is opened, the old temporary word file is deleted. Figure 5 open a real temporary word file figure 6 open the directory in the e-book to obtain different word files. In this case, you can only use a stupid method to open a directory (File) of the e-book each time ), then copy the temporary word files in the C: Documents and SettingssimeonLocal Settingsemp143737186988911890705 directory to the specified file directory. Note that you must go to the temporary directory of the current account (simeon in this document) to obtain the file. There are five files in total, as shown in figure 7. Figure 7 obtain all the word files (5). Note that it is a cracking method instead of actually cracking the e-book file, later, I continued to track and analyze the information on the website, found a software known as cracking the mailbox password, and used anti-virus software to detect viruses, after running the command directly, a dialog box asking you to enter the NAME and KEY is displayed, as shown in figure 8. In essence, you need to pay for the service and click "Buy Now!" The IE browser will open the software purchase page 9. Figure 8 software registration verification Figure 9 after the software is purchased, my first feeling is, will it be a "social engineering" for phishing purposes, so that you can enter the account and password for the transfer, then, transfer all the money in your account! I personally feel that the meaning is not very great. At least I won't buy it, nor believe it in this kind of stuff, and I will not try it later. When I looked at the software downloaded during my research on this topic, I found that one of the software was exactly the same as the software used for "email password cracking magic book", as shown in, I don't know who is authentic. Based on my intuition, I can confirm that this well-packaged "email password cracking magic book" and software is a scam, I joined its public QQ Group later. Many people in the group were very angry and cheated! In today's materialistic age, we should have a spirit of criticism and persistent pursuit for everything. Only by constantly exploring can we unveil its mysterious veil! My QQ group is 61193014. welcome to join us! Note: The software mentioned in the email password cracking magic book has been placed on the supporting CD, and its Word documents are also included. Figure 10 email cracking software in the video figure 11 found on the Internet