Disclaimer! : The purpose of this post is to demonstrate how the hacker can use Tricking Software’s to hack your account. We just want you to be aware of this and We do not encourage you in any manner to try it on Others.
This is the Simplest way a hacker can use to hack your gmail password, However this may not work for some people because most Antivirus software’s easily recognizes this ‘Gmail Hacker software’. This trick involves creating a special .exe file and sending it to the Victim. and when he or she runs this ‘Gmail hacker software’ the hacker will get the Username and Password to his “Inbox”.
Basically here, the Hacker just tricks his victim to enter his Login credentials by luring him to hack his friends account.
Follow the Steps to see yourself how “Gmail Hacker Software” works:
Step 1: Download ‘Gmail hacker’ Software (extract the file to desktop). If your Antivirus deletes the file, then please turnoff your Antivirus or uninstall it and try downloading again.
Step 2: Run ‘Gmail hacker Bulder.exe’ file and enter your gmail account details, so that the password of your virtual-victim can be mailed to you. If you are afraid of entering your gmail details, then do create one fake account and enter those details.
Step 3: After you enter your ‘Gmail account’ details Click on ‘Build’. Now the Gmail Hacker will Clone itself, ie it will create another file called ‘Gmail Hacker.exe’ and will save it in the same folder.
Step 4: Now Send this clone ‘Gmail Hacker.exe’ file that you just created to your virtual-Victim via chat or email. you could just take this on different PC to try.
Ask your virtual-Victim to try that software to hack others email and some how convince him to run that software and enter all the information (which includes his Gmail id and password plus Gmail ID of the victim he want to hack).
When he enters the required information and hits the ‘hack them’ Button, he will receive an error message as shown below and his Username and Password will be mailed to your Gmail Id (that you Specified in Step 2)
Note: You should Provide a valid USERNAME and PASSWORD in step 1, in order to receive the hacked details.