So after helping someone get the correct syntax to use Hydra against an SMTP mail server, I decided to try it against my Google hosted email account and not only did Google block the attempt, alert me of the attempt via email to both my primary and secondary account, they also allowed me to see the IP address and the what the device was (presumably from the user agent, but since this was Hydra it was just unknown since there was no user agent sent.)
Great job Google, providing the victim with actual helpful information is what every company should do. I recently had my bank account locked down after a hacking attempt and after several phone calls, and going to the bank they still would not release the IP address or any other information like the password attempts. As you can see by the image below, Google even points out that they knew my correct password. If my bank would provide me with this information I could figure out if the hacking attempt was random or from someone who knows me.
Special thanks to Joe Smith, for making me attempt this is the first place. Here is the (edited) Hydra syntax I used:
hydra -l email@gmail.com -P ~/Desktop/gmTest.txt -S -s 465 -v -V smtps://smtp.gmail.com
If you like my videos, please subscribe to me on YouTube:
http://www.youtube.com/subscription_center?add_user=GarrettFogerlie
http://www.youtube.com/subscription_center?add_user=GarrettFogerlie
Follow me on Twitter, @gFogerlie and Google+ https://plus.google.com/+GarrettFogerlie
If you have a video request you can let me know in the comments here or on my channel:
https://www.youtube.com/user/GarrettFogerlie/discussion
https://www.youtube.com/user/GarrettFogerlie/discussion
That's sucks :(
ReplyDeletegot eem
ReplyDeleteSomeone can help me to brute a website? skype: gu_rezende
ReplyDeleteWORD UP
ReplyDeletei wonder if there is away to get around it
ReplyDeleteso what the solution do u think ? is there any other way to brute force gmail ?
ReplyDeleteThus, while you use the internet, you need to maintain balance and ensure security by controlling the real Internet security threats 먹튀검증
ReplyDelete