Email Hacking

In today’s world, most people communicate via email. Hackers may gain access to sensitive, confidential, and personal information stored in the mail storage system.

In addition, attackers may be allowed to read and send email – as well as receive email sent by the legitimate owner. You can also set up automated email processing rules using some email platforms. They are all potentially harmful to legitimate users.

Email Hacking can be possible to many ways like:-

1. Social Engineering

2. Phishing Attacks

3. Cookie Hijacking

Social Engineering:

Humans’ minds can be hacked without the use of any software.

Social Engineering does not deal with network security concerns, vulnerabilities, or exploits. Psychological tricks are used to gain access to information through easy methods.

This really works!! But it requires a lot of patience.

We are all talking about network security and fixing the vulnerabilities in networks.
But what happens if some internal person of a network accidentally gives out the passwords. After all we are all humans; we are also vulnerable and can be easily exploited and compromised than the computers.

Social Engineering attacks have become most common during the chat sessions.

With the increase in use of Instant Messengers, any anonymous person may have a chat with another anywhere in the world. The most crucial part of this attack is to win the trust of the victim.

Use Maltego – A Social Engineering Software

Maltego is a software used for open-source Cyber intelligence and forensics, developed by Paterva. Maltego focuses on providing a library of transforms for discovery of data from open sources, and visualizing that information in a graph format, suitable for link analysis and data mining.

How To Run Maltego – Cyber Intelligence And Forensics Software

Phishing Attack:

A method of sending an email posing as a legitimate enterprise to trick the user into revealing personal information for the purpose of identity theft. A link includes a link to a Web site which asks the user to update personal information already held by the legitimate organisation, including passwords and credit card numbers, social security numbers, and bank account numbers. However, the fake website is designed solely to steal user data.

Cookie Hijacking:

With cookie hijacking, email accounts can be hacked easily. Because this trick is so dangerous, the attacker does not need to hack the victim’s email address again when the user changes the password. Without asking for the password of the victim’s account, you would be taken to the inbox of the account.

U Can Hack Yahoo Account by Cookies Stealing or Hijacking From Browser.
Follow Steps and Learn it.
This is very Simple Tutorial and 100% Tested..!!


Step 1: Download the Script on given link

Step:2 Download and extract files to your hard drive.

Step:3 Create an account in any FTP hosting site i suggested

Step4: Login to your account and upload 4 files into your FTP account.

Step5: Give this code to victim to run in his browser when he would be logged into his yahoo account. Yahoo.php is basically cookie stealing script and hacked.php executes the stolen cookies in browser.
Stolen cookies get stored in directory ‘cookies’.


He would again redirected to his yahoo account.

Step6. Open the hacked.php . The password is ‘hoc’.


You must have got the username of victim’s account. Simply Click on it and it would take you to inbox of victim’s yahoo account without asking for any password of victim account.

What are the signs of email hijacking? How do you identify it?

  1. You might see spam emails from people you know.
  2. Your password no longer works when you try to access your account.
  3. The “Forgot Password” link does not send the expected email when you try to access it.

Security Tips –

  • Immediately change your password.
  • Send your friends an email warning them not to click on any links they receive from your email account.
  • If you have been hacked, notify the authorities.
  • Make sure your computer is protected by an antivirus program.
  • Activate Two-factor (2FA) authentication if it is available.
Disclaimer: This article is knowledge purpose only. 

Join Our Club

Enter your Email address to receive notifications | Join over Million Followers