Who can read the correspondence in a contact. How to read someone else's VKontakte correspondence without programs. Hero # 3. "Hacked" a colleague's VK page

Most people have asked themselves this question at least once. Someone does not trust their soul mate, others have competitors and enemies, and some are just curious.

Here you need to remember one thing once and for all: there is no way to do it. Whatever offers you come across on the world wide web: services of sites, applications (free and paid), all this is guaranteed deception and fraud. A striking example is the PageHack program and its analogues.

In reality, all of these programs and sites usually have different goals.

  1. Lure the user with promises of hacking the correspondence, so that he eventually pays the indicated amount to view the result. Naturally, after payment, he will not receive anything.
  2. Hack the account of the person who applied. Hacking sites like http://vk-messages.ru/ offer the user full access to their page before starting all actions. But here it is enough to think logically: are you really ready to give full access to your page to a service that positions itself as a private message cracker? The hacking software also sometimes asks you to enter your username and password. Obviously what will follow.
  3. Infect your computer with viruses, advertising banners, application installers. By downloading software for hacking pages and correspondence from dubious places, you risk the security of your system very much. Trojans, viruses, keyloggers and other malicious software products are often spread this way.
  4. Blackmail by addressing the victim. If you wrote to a scammer from a real page or provided personal data about yourself, he may start extorting money under the pretext of handing you over to the one you asked to hack.

And these are far from all the options for the bad consequences that can await when looking for a way to view another person's personal correspondence. To once and for all protect yourself from them, you need to remember that you cannot read other people's messages in any way. And this is not a moral assessment of behavior, but a technical fact. There is only one way - to hack the page itself. And here there are already many options.

The same rule applies here. No need to use suspicious services and programs that offer hacking. All of them are likely to be fraudulent or infect your computer with malware. Among the effective methods of hacking a page, you need to choose those where only you and the victim of the hack act. We will not describe in detail the instructions for stealing an account here, there is a separate article about this. But in general terms, the options are as follows:

  1. Saving username and password on your device. If you personally know a person, invite him to enter VK from your PC or gadget. Pre-set the settings for saving all data entered in the browser or run special software for these purposes. It is easier to do this in mobile applications for Android and iPhone, since giving your friend your phone to check VK is not such a rare practice.
  2. Install a Trojan or keylogger on the victim's computer that will send all the keys pressed to the email address. Sometimes you just need to follow the link to install. The link can be masked. So you can find out the login and password of the account, log in to it and read the correspondence.
  3. Interception of cookies using a token key. There are many ways to find out the user's token; there is also a separate article about this. The easiest way is to create an application that will send to the site with a token in the address bar. You just have to persuade the victim to launch the application, get a token, enter it into the cookie manager program and all of its cookies will appear in your browser, which means that the VK account will be authorized.

These and other hacking methods involve activity from the victim. The person must follow the link, give you information about himself, accept some files, or correspond with you.

All this only seems difficult to achieve. In fact, various forums and marketplaces are full of offers for the sale of archives with hundreds or even thousands of hacked pages (each literally for a penny). From this it can be understood that people are easily amenable to simple manipulations and experienced crackers are able to do their job on the stream.

But back to the main topic - correspondence. Let's say you gained access to your profile by hacking a page. Go ahead.

How to read other people's correspondence unnoticed

If your initial goal is to monitor a person's correspondence, then after hacking his account, proceed with caution.

  1. Do not click on any dialogs if they contain unread SMS. Also, don't click on the message toast notifications. Seeing the read SMS, a person will immediately suspect that something was wrong.
  2. Ignore invitations to groups, publics, meetings, and especially be careful if you are added to the conversation or the person is already in it. Better not to go into them at all. Even if there are no unread messages, the turnover can be high and people there often exchange pictures, reposts, etc. In these cases, there is no warning Typing message. You just won't have time to react.
  3. Don't like, don't leave comments. There is no need for explanations at all.
  4. Best of all, go to someone else's VK from third-party applications that have an invisibility function and do not inform about reading messages, such as Kate Mobile. This will greatly facilitate the inconspicuous stay in the profile, because the first item will be performed automatically when the option is turned on.

Permitted methods of espionage VK

Why allowed? Yes, just in them you will not have to deceive anyone, infect with viruses, use third-party programs and even communicate with anyone. True, here you will not read other people's letters. But then look at the personal photos that are exchanged by interlocutors in the LAN, files sent to communities and to each other, read comments in groups. These methods have been working for many years and are still relevant in 2017.

Access to photos and other files in general search

When one user sends another any document, it is saved on the VK server and then freely indexed. Every day there is a huge amount of new materials, and many people do not even suspect that a personal photo, a file that they "secretly" shared with an interlocutor, are available to everyone at any time. You need to do the following:


Reading user comments

To find out what comments a particular user has left, just use the special link http://vk.com/feed?obj=12053604&q=§ion=mentions. Instead of numbers, after the = sign, insert the person's ID and you will see his comments for the entire time of using social. networks.

However, this method has limitations. You can not read comments that have not been answered, as well as if they are posted in closed communities.

There are also special services that allow you to find out with whom a particular user is communicating. Such an online service allows you to track the activity of hidden friends, set up tracking of messages and likes of any users of the VKontakte social network. You can also set parental controls and secure the children's social circle and monitor the content that will be shown to them. You can see what groups they are in and who they like.

Hello! Here is my personal blog on mobile security, where I regularly publish interesting material. Have you ever wondered if an attacker can remotely read other people's messages on your phone? How to protect your correspondence from such infringements on your privacy? At a time when husbands are trying to keep an eye on their wives, and bosses are trying to keep track of their subordinates, it is useful to know basic safety rules. This is what this article will be about. At the very end of the material, I will give a link to an interesting video.

So, how is the reading of other people's messages on the phone carried out? There must be some applications for this, that's what I thought. So I went to the World Wide Web to look for programs of this kind. I just wondered if they were available to everyone. I looked at various sites, installed some applications on my mobile phone. It was not possible to find anything really working, but a huge amount of a scam came across! Pay close attention to what you install in your phone, because you can pick up viruses!

Then I went the other way, starting to study services for backing up information. They are useful in case of a possible loss of your mobile phone. It is difficult to insure yourself against this, and many people have stored official data in the phone for a long time. This may affect the conduct of the current working project, or even your entire career! Therefore, it is better to set up sending data to some server, where no one except you will have access. Lost your mobile phone? It doesn't matter, we copied and restored the entire database. So I came across such a service, now I'll tell you more about it!

Of course, directly reading other people's private messages through it will not work, it was not created for this. But you can install a special application on your mobile phone that will collect information. These are not only SMS and MMS, but also recordings of conversations and correspondence in social networks. Many popular mobile clients are supported, and this application surprised me. I have not seen analogs anywhere! I also liked the option to send files over Wi-Fi. 3G traffic is constantly in short supply, now there is an opportunity to save it. After setting up the service, the forwarding occurs automatically, every few hours. All archives go to the user's personal account, from where they will be available to everyone.

Can an attacker read other people's private messages through similar software? Think about it yourself. Suddenly someone will install a similar program in your memory, but it doesn't matter which one! These utility utilities are capable of sending files remotely, antiviruses do not swear at them, and protection against uninstallation will not allow you to quickly clear the program from the memory of your Android device. Therefore, be careful, do not leave your mobile phone unattended! Especially if you leave somewhere from the office.

Surely you will be interested in the service described above, so I recorded a video about fine-tuning it. It won't take more than a few minutes, so be sure to watch the video after the article. You will learn about setting up a user's personal account, and about viewing the collected information. But do not forget that such programs should not be installed in other people's smartphones, because the owner of the mobile phone would definitely not like it!

Application features: reading correspondence SMS, MMS, Vkontakte (official application and Kate Mobile), Odnoklassniki, Facebook, Moi [email protected], Vseti.by, Twitter, Hangouts, Google+, WhatsApp, Skype, Viber, Hangouts (formerly Google Talk ), [email protected], ICQ, IM + and IM + Pro, AIM, Jabber, MSN, MySpace, Yahoo! and Ya.Online (Yandex Chat), Email correspondence Gmail and [email protected], view visited sites in browsers Chrome, Opera, Firefox. Get access to the list of calls and the location of the phone. This is a small part of all the possibilities. The whole

Video installation guide for any phone:

Video guide for installing on a phone with ROOT rights:

Installation and configuration instructions:

  1. We start a personal account using this link: "Create a personal account" (just register there).
  2. We go to this link: "Enter your personal account on the site" and enter the Email and password that you specified before registration.
  3. We press the button: "Add phone"
  4. We fill in all the fields that are asked to enter. We fill it in correctly as it is written there, otherwise it will not work.
  5. We press the button "Save".
  6. We read the instructions that appeared after clicking the "Save" button
  7. We install the application on the phone (the one from which you need to get information), and configure it according to the instructions that you will have to read in step 6.
  8. The application is installed. Things are good. The developers write that you need to wait at least an hour for the data to start flowing into your personal account that you entered in step 1. In our case, the data came in 4 hours. The plan succeeded! Wish you success.

There are several potentially possible ways to read correspondence: through an Internet service, through a program, and hacking into an account. Let's take a look at all these methods.

Internet services

Sometimes there are sites where, for a certain fee, access to the correspondence of a given person is offered, supposedly the database was recently leaked. It is hard to imagine that the base of user dialogues in contact weighs more than 17 terabytes, and the base consists of only pairs of login: friends, people - 4.5 terabytes. It is clear that such data is unlikely to be just lying around, and if hackers get access to it, it will be rather difficult to download and operate with it.

If you are told that the obtained correspondence was obtained by hacking everything in contact, then do not believe this and immediately close the page.

For the sake of experiment, we tried to access messages through one site, which we will not name, as a result, after a few hours, the username and password on the account was changed and spam fell on our friends, fortunately, we were able to quickly restore the account.

Reading other people's messages through the program.

The approach here is the same, most likely they are going to slip you a Trojan that will steal your account data.

Another version of the software is brute-force, which enumerates possible password options in the database for accessing the account. If you got access to the victim's account, you can read the correspondence, if. If you just sort out passwords, then an 8-character password is 222 trillion options, then it will take 94 thousand years to brute force. If the victim has a password like "Fjf76Fdgs" and she does not use it anywhere else, this option is doomed to failure.


Another version of the program is keyloggers or keyloggers, but for this method you need to have access to the computer of the person whose correspondence is needed. Some of the best are: punto switcher, Mipko Employee Monitor, JETLOGGER.

What is a keylogger in essence? This is a program that, strictly speaking, has nothing to do with the keyboard directly. It is installed in the computer memory and operates on the hard disk. Often, the signs of its activity are not visible on the computer, if you do not look for them purposefully. All keystrokes are recorded (you can get both a login and a password) and all messages typed by a person, messages that a person receives, you will not see if the program does not have a built-in function for creating screenshots.


Account hacking.

In the comments you can see spam, which offers hacking of VK accounts and downloading correspondence, if a person is really going to do this, and does not lure money from you, then he will brute force the password or using social engineering, when the weak link is not the site is a person himself, from whom it is easier to get a password with the help of tricks and special computer tools.

The result of these actions is not guaranteed and largely depends on luck. As a result, there are no easy ways to read the correspondence. And even if they were, then it is not in the interests of Vkontakte, so that such confidential data could be easily obtained.

In our service, you can follow your friends, whom they add and remove from friends, who subscribes to them, their fans and friends who hide them.

Do you want to know how to earn 50 thousand monthly on the Internet?
Watch my video interview with Igor Krestinin
=>>

Does your significant other constantly correspond with someone on VKontakte? And when you enter, immediately goes to another tab? Are you exhausted with jealousy, and are ready for anything, just to find out what this correspondence is? And the question begins to torment you: "How to read other people's messages in a contact?"

Or are you worried about your child's behavior and want to know more about their contacts? Then this article is for you. I will not read morals, that it is indecent to read other people's letters, this is not my business. Everyone decides for himself what is good for him and what is bad.

Honestly, I have nothing to hide, and if my wife wanted to see my messages, to anyone else, I would give her such an opportunity myself. I have no secrets from her, everything is built on mutual trust.

However, if you have doubts and you noticed that your partner is behaving strangely, then there are ways to "spy" about what he (she) is texting with friends on VKontakte.

Although, sometimes it is better not to know what can cause you to worry and worry. In addition, there is a possibility of being exposed for obscene pursuits. Then you risk losing trust and ruining your relationship.

And yet, before hacking someone else's page and reading messages, think, would you like it if your page was hacked and read your messages? Do you still want to know how to read other people's messages in a contact?

I warned you, and now let's get down to business. There are several ways to read someone else's VKontakte correspondence:

  • Special programs;
  • Online services (paid);
  • Keylogger;
  • Phishing site;
  • Hijacking the session.

Special spyware

Now on the Internet there is a huge offer to download a free spyware program that hacks VKontakte pages and allows you to read other people's messages.

Do you really think that some script, a self-taught hacker will be able to hack a page on a social network? Of course not! You will simply be punished for your greed and stupidity.

When downloading the program, you will have to turn off the antivirus, as a result, you will download yourself a malicious code that can block your computer, get your secret passwords from various services. That is, if you intend to hack a friend, you yourself risk being hacked. Do you need it?

Online services for a fee

Another scam is online services. You provide the data of the person (last name, first name, VK profile, ID) whom you want to hack, the period for which you want to receive his messages. You are shown a photograph of a person, and, as it were, his "correspondence" (part of the correspondence).

They will ask you to pay. After payment, you have two options:

  1. They won't send you anything;
  2. You will be sent a correspondence, but you have no guarantee that it was he who wrote it. That is, I can go to the user's page, see who his friends are, compose a correspondence with any friend, and send it to you. How do you make sure your friend wrote it, or didn't?

Keylogger

If you live with a person together, you can install a keylogger and configure it in such a way that all the text you type is sent to your e-mail. Thus, you will know what your "suspect" writes when he is at the computer.

This method will not be able to track his communication from phones.

Phishing site

It is possible to get to someone else's VKontakte page only if you know your username and password. And ideally, you still have access to the phone. If the partner does not tell you the login and password, you can only find them out using a phishing site.

That is, you must know the PHP programming language to create such a site, or have a programmer friend who will create such a site for you.

Then, by some fraudulent means to force the "victim" to go to this site, and enter the login and password from VKontakte there. Then get this data at your disposal.

As you can see, the method is working, but almost impossible to implement. You will look too suspicious, persuading a friend to go to the left site and leave your username and password.

Session hijacking

I heard about such a method as session hijacking, but did not test it myself. Therefore, I write from hearsay. Once again, I warn you that I do not believe in the possibility of hacking your account, and by downloading various programs, you thereby take on the risk of infecting your phone.

You need to install administrator rights (Root), buzybox program and cSploit application on your smartphone. Connect to the modem of the "checked" from your smartphone with administrator rights, and then, when the person enters VKontakte, intercept his session.

That is, with the help of administrator rights and installed programs, you can open a person's account at the same time when he is online and watch his correspondence, communication, visits in real time. You will see on the screen everything that the person on whose page you are seeing.

How real this method is, I cannot say, you can find more detailed information on the application of this method on the Internet.

My task is to describe all possible ways, and answer your question, how to read other people's messages in a contact.

How to read other people's messages in a contact, the result

So you learned how to read other people's messages in a contact, whether it's real or not, it's up to you. But it is better not to engage in illegal actions, trust your soul mate, give her (him) more freedom, and you will definitely be fine.

How would you yourself feel “under the hood” of constant surveillance, in an atmosphere of mistrust and jealousy?

Best of all, do something useful, interesting, then you will be interesting to your friends and partners. Do not depend on other people, be, people like a magnet attract attention to themselves.

P.S. I am attaching screenshots of my earnings in affiliate programs. And I remind you that everyone, even a beginner, can! The main thing is to do it correctly, which means to learn from those who are already earning money, that is, from professionals.

Do you want to know what mistakes beginners make?


99% of newbies make these mistakes and fail in business and making money on the Internet! Take a look so as not to repeat these mistakes - "3 + 1 BEGINNER ERRORS KILLING THE RESULT".

Do you urgently need money?


Download for free: " TOP - 5 ways to make money on the Internet". 5 best ways to make money on the Internet, which are guaranteed to bring you results from 1,000 rubles per day or more.

Here is a ready-made solution for your business!


And for those who are used to taking ready-made solutions, there is "Project of ready-made solutions for the start of making money on the Internet"... Find out how to start your own business on the Internet, even the greenest newbie, without technical knowledge, and even without expertise.

The social network VKontakte is the most popular in Russia. It is used by almost every second resident of the country, so it is of great interest to hackers and ordinary developers who are looking for all kinds of gaps in system protection. Since all user data is stored in a database, it is obvious that it is enough just to find some way to get access to it, after which it will be possible to read other people's correspondence and do many other things.

One of the hackers under the nickname Yoga2016 in an interview with TJournal said that a bug in the VKontakte social network allows you to read other people's correspondence. This is done through the site statistics service SimilarWeb, which allows access to the personal messages of any user, thereby compromising the safety of tens of millions of residents of Russia and other countries who have entrusted their personal data to social networks.

The VKontakte press service quickly reacted to such information and stated that if such a problem exists, then it was created exclusively by third-party developers, which the social network cannot influence in any way. Through the paid version of SimilarWeb, you can get links to 300 of the most popular materials on any website. When the user received such services, then all these links turned out to be personal messages of random users.

This suggests that the SimilarWeb service is able to intercept all private messages and provide access to them via direct links to third parties. It was not possible to view the text in its pure form, so the developer added the extension ".xml" to the endings of the links, thanks to which he was able to get acquainted not only with personal messages of users, but also with other data - photos, sent emoticons, page numbers and many other data.

The social network VKontakte does not see this as a problem, because it was created by third-party developers who use the API incorrectly. According to the press service of the social network, users, when they use third-party applications to use the VKontakte account, themselves consent to the processing and storage of personal information, including correspondence. This means that there is a leak somewhere in the SimilarWeb service, which became possible due to a software bug. With its help, personal messages of any person can be read.

The VKontakte press service promptly contacted the site and said that it was really not about some kind of vulnerability in the social network, and not about unscrupulous developers. They abused their rights and, for some reason, decided to transfer users' personal data (correspondence) to the SimilarWeb service. At the same time, according to official information, in this way it was possible to receive only 400 tokens, that is, personal data of 400 users. They all entrusted their personal data to an unsafe application.

Currently, on March 6 at 23:30 Moscow time, all dangerous tokens are blocked to protect the personal data of VKontakte users. The social network recommends using only official clients to gain access to your account, because otherwise there is always the possibility of leakage of personal confidential information.

Previously site wrote that now anyone can get a paid set of stickers on the VKontakte social network.

Until December 22, inclusive, everyone has the opportunity to Xiaomi Mi Band 4, spending only 1 minute of their personal time on it.

Join us at