Ultimate QQ anti-leech Protection

Source: Internet
Author: User

QQ is gaining more and more attention from hackers because of its special position in the network. QQ is also being stolen frequently by more and more cainiao. Next I will share my experience and some useful tips on QQ anti-black, hoping to help many cainiao.

Common QQ attack methods:

1. brute force cracking

Use the brute-force cracking + Good password dictionary to crack the local QQ password file or the online QQ password dictionary.

2. Dedicated cracking tools

One of these types of software is to directly crack the last password of the local QQ number that used to select "do not show logon box next time, one is to use QQ black and soft, which is called "stealth wall-crossing", to call the QQ main program through an independent execution file, and directly log on to QQ without password verification.

3. Use the trojan program

You can trick a target into browsing a webpage containing a QQ Trojan to automatically download and run the trojan, or send software, images, and other files bound with the Trojan to the target for execution. The trojan steals the password by obtaining the password in the QQ logon window or recording the key-down record, and sends the password to the specified Email concurrently (this type of software is used to steal the QQ password that blackbase gives to blackbase members) or save it to a specified location on the computer.

4. Crack the Emai password for registration with QQ password protection

You can obtain your QQ password by cracking the password for registering a QQ password to protect your mailbox.

5. exploit the vulnerabilities of QQ Software

Attackers can exploit the vulnerabilities of QQ Software to send attack information to the target, forcing them to go offline or causing QQ program to exit incorrectly.

Preventive measures:

I. Most basic precaution: You must apply for password protection. (Never make up for it)

Ii. Prevention of tit-for-tat:

1. brute force cracking:

① A complex password is the key, with more than 8 digits + uppercase/lowercase letters + symbols. This setting is a challenge to the patience of brute-force hackers, online cracking will also be a challenge to its economic strength.

② Delete the folder that stores your QQ number record after turning it offline to prevent cracking of the Local Password File.

③ When logging on to QQ, you can add a lot of 0 logins to the front of the number, so that you can avoid detecting your QQ number using online cracking software such as qqdreams.

④ Using QQ proxy, it is easy to chat with the other party "Two Worlds" to hide their real ip addresses and avoid online cracking.

2. Special cracking software:

① Delete the folder that stores records with your QQ number after deprecation.

② Do not save the password when logging on to QQ.

③ In the folder where QQ is located, delete the OICQ2000.cfg file in the sub-folder, so that the next time you start QQ, you can only use the "register Wizard to log on", which will invalidate the "invisible wall penetration.

  • 1
  • 2
  • Next Page
[Content navigation]
Page 1: Ultimate QQ anti-theft and anti-Black Book Page 1: Ultimate QQ anti-theft and anti-Black Book

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.