Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   378

How are most email based combos or mail lists made nowadays?

by nekowinter - 03 July, 2024 - 04:05 PM
This post is by a banned member (nekowinter) - Unhide
61
Posts
1
Threads
2 Years of service
#1
hii i was wondering how most email combo lists or just email leads are made nowadays, is it still done primarily through sqli or is a new way being used
This post is by a banned member (UberFuck) - Unhide
UberFuck  
Godlike
1.554
Posts
375
Threads
6 Years of service
#2
Malware (such as RedLine) has become more prevalent. SQLi is still used, but really using any method to gain access to a private database. For example, after exploiting one vulnerability you can sometimes use that to back your way into accessing admin panels or shells that can be utilized to dump database contents.
This post is by a banned member (syfex) - Unhide
syfex  
Contributor
1.021
Posts
230
Threads
5 Years of service
#3
SQL is still famous but as @UberFuck said, people filter combolists out of logs.
This post is by a banned member (nekowinter) - Unhide
61
Posts
1
Threads
2 Years of service
#4
(04 July, 2024 - 02:32 AM)syfex Wrote: Show More
SQL is still famous but as @UberFuck said, people filter combolists out of logs.

Do you know what tools can be used to filter combolists out of stealer logs?
This post is by a banned member (syfex) - Unhide
syfex  
Contributor
1.021
Posts
230
Threads
5 Years of service
#5
(This post was last modified: 05 July, 2024 - 04:24 PM by syfex.)
(05 July, 2024 - 04:03 PM)nekowinter Wrote: Show More
(04 July, 2024 - 02:32 AM)syfex Wrote: Show More
SQL is still famous but as @UberFuck said, people filter combolists out of logs.

Do you know what tools can be used to filter combolists out of stealer logs?

PM me on telegram and I'll show you.

(05 July, 2024 - 04:03 PM)nekowinter Wrote: Show More
(04 July, 2024 - 02:32 AM)syfex Wrote: Show More
SQL is still famous but as @UberFuck said, people filter combolists out of logs.

Do you know what tools can be used to filter combolists out of stealer logs?

https://t.me/syf_ex

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 1 Guest(s)