How to hack a mailbox?

Surely many Internet users have ever heard about mailbox hacking. Most likely, you yourself were repeatedly at risk of losing your email inbox. Remember how many times you received a strange kind of letter in which it was reported that you won the lottery, became the winner of some dubious draw, and so on. In each such letter, in addition to its contact information, it was necessary to specify the data to enter the mail.

In addition to the above, there are many ways to crack someone else's mailbox. Let's take a closer look at them, as this will help protect your own email from the actions of intruders.

Ways to break mail

How to hack a mailbox? There are several ways to gain control over someone else's mailbox. Each method has a different degree of technical complexity. Some methods do not require any special knowledge, while others require good technical training.One of the interesting ways to find the password from someone else's mailbox is described in the article How to find out the password from the mail?

Phishing

This is a fairly simple, but not always effective way. The effectiveness of phishing depends on its technical complexity. The easiest option of phishing is to send a letter to which the recipient will respond and in the answer will give out his personal data. Surely you received letters with loud headlines "you won a million euros" or "your mailbox was hacked." Today, few such letters are being kept, as many mail services warn users about their danger.

For higher-level phishing, use links to dummy pages. For example, a user receives an email with certain information and a link to one of the mail services. Clicking on the link, the user will be taken to a dummy page, which can completely copy one of the pages of the mail service and contain a form to enter the mail service. Having entered all the necessary information on such a page, it does not fall on the mail server, but directly into the hands of intruders.

Сross Site Scrrting

Breaking mail using various vulnerabilities or, in other words, xss (Cross Site Scrrting).The essence of this method lies in the introduction of various malicious links or malicious code on a specific web page. This method allows using a special script command to get access to the user's cookie files.

This method requires a certain knowledge of programming languages, as well as knowledge of vulnerabilities of postal services.

Bruteforce

This method is the most rude, as it consists in the elementary selection of a password to the mailbox. Password selection is performed using a special program that has its own dictionary of passwords. It is worth noting that this method is not very effective for complex spills, when the password contains upper and lower case letters, numbers and special characters. In addition, almost all mail services have a limit of attempts to enter a password, after which there will be an ip block from which the authorization request originated.

How to protect your mailbox?

Methods of protection are very simple - to start, create yourself a "complex" password for the mailbox. Recall that a complex password must have upper and lower case characters, special characters and numbers (for example, Fg-08 ** hd74g - such a password cannot be cracked using the matching method).

To protect against phishing, just be careful.Enter your username and password from the mailbox only on the authorization page of the mail service. Be careful and look at the address of the page containing the forms for logging into the mailbox.