- Joined
- Nov 12, 2024
- Messages
- 6
- Reaction score
- 37
- Points
- 13
- Thread Author
- #1
Hey there, are you looking for a simple way to make money online? Well, I’ve got something amazing for you! You don’t need any coding skills or hacking knowledge. You just need to follow these easy steps, and you could start making $500 to $1000 a day or more with minimal effort!
This method uses a flaw in older Windows computers, known as the BlueKeep loophole. It allows you to connect to these computers and delete all their IMPORTANT FILES/DATA (BASICALLY CONTROLLING SOMEONE ELSE'S COMPUTER FROM YOUR OWN COMPUTER.) No coding, no hard work, just follow the steps below!
[Older Systems Doesn't Mean It's Useless. Basically There Are A Lot Of Companies & Businesses Who Still Use Olders Windows Like Windows 2008 Server & Windows 7 Server Etc...These are a little different than normal windows OS. Think Of It Like A Windows OS But Just For Big Companies & They Use Older OS/Systems To Cost Cut And Spend More On Other Things.]
Step 1: Find Computers with BlueKeep Loophole
First, we need to find computers that have this BlueKeep loophole. These are older systems that are easy to exploit if you know what you're doing. Luckily, it’s simple to find these computers using a website called Shodan.io. It’s like a Google search for devices!
How to Search on Shodan:
Go to Shodan.io (it's free for basic searches).
Type this in the search bar:
Search Query 1 - port:3389 product:Microsoft Windows
Search Query 2 - "\x03\x00\x00\x0b\x06\xd0\x00\x00\x124\x00"
This search finds computers with Remote Desktop open (that’s a way to control the computer remotely).
Be Creative Yourself And Build Your Own Search Queries Or Find More On Google
These will help you find more vulnerable systems quickly.
Extra Info:
If a device is vulnerable to BlueKeep, it'll show automatically if it’s vulnerable on the Shodan Website Itself.
Step 2: Exploit the BlueKeep Loophole Using Metasploit
Now that you’ve found some vulnerable computers, it’s time to use a free tool called Metasploit. It’s a tool that helps you take advantage of the BlueKeep loophole. Don't worry – it's easy to use, even if you’ve never done this before!
How to Use Metasploit:
I Can't Explain Everything About The Tool Here, instead search for videos online to help you out. Simply go to YouTube and search for one of these phrases:
"How to exploit BlueKeep with Metasploit"
"BlueKeep Metasploit tutorial"
"How to hack BlueKeep using Metasploit"
These video tutorials will guide you step-by-step, showing you how to exploit BlueKeep using Metasploit. It's a goldmine of information that can get you the results you need, without any technical confusion.
Step 3: What to Do After You’re In
It's Basically Like Controlling A Different Computer From Your Own Computer
If you're inside a system, you can either delete all files or lock them. To do this, delete everything from the system or make sure it’s locked so no one can access it. You can even leave a message like:
"Hey, I've transferred all your files to my own servers. Pay up to get them back. Or I can delete them forever. Pay $500" [It's Just An Example, Craft A Better Message.]
This is the same trick bad actors use.
Step 4: How to Do This Again and Again
Now, imagine doing this every day. If you do this 10 times a day, and only one person agrees to pay you $500 for fixing their computer, you could be making $500 a day without any hard work!
Just keep searching for these computers, and getting paid for it. It’s all automated, so once you get the hang of it, you don’t even have to do much.
Step 5: Stay Safe and Anonymous
To protect yourself and stay anonymous, follow these steps:
Use a VPN/PROXY – This hides your real location.
Use Bitcoin or other anonymous payment methods when asking for money.
Don’t give out any personal info – stay lowkey!
Why This is a Goldmine
By following these easy steps, you’re tapping into a huge opportunity. It’s like finding a hidden door into a business. And the best part? It’s all automated. You don’t need to learn coding or complicated hacking stuff. You just need to follow the steps, and you’ll start seeing the money come in.
This method is so easy, even kids can do it. You don’t need to know anything about coding, and everything is automated. Just follow these steps, and you could start making money today!
Good luck!
Need help or have questions? PM me here on the forum or hit me up on Telegram: @GlitchPoolOfficial.
This method uses a flaw in older Windows computers, known as the BlueKeep loophole. It allows you to connect to these computers and delete all their IMPORTANT FILES/DATA (BASICALLY CONTROLLING SOMEONE ELSE'S COMPUTER FROM YOUR OWN COMPUTER.) No coding, no hard work, just follow the steps below!
[Older Systems Doesn't Mean It's Useless. Basically There Are A Lot Of Companies & Businesses Who Still Use Olders Windows Like Windows 2008 Server & Windows 7 Server Etc...These are a little different than normal windows OS. Think Of It Like A Windows OS But Just For Big Companies & They Use Older OS/Systems To Cost Cut And Spend More On Other Things.]
Step 1: Find Computers with BlueKeep Loophole
First, we need to find computers that have this BlueKeep loophole. These are older systems that are easy to exploit if you know what you're doing. Luckily, it’s simple to find these computers using a website called Shodan.io. It’s like a Google search for devices!
How to Search on Shodan:
Go to Shodan.io (it's free for basic searches).
Type this in the search bar:
Search Query 1 - port:3389 product:Microsoft Windows
Search Query 2 - "\x03\x00\x00\x0b\x06\xd0\x00\x00\x124\x00"
This search finds computers with Remote Desktop open (that’s a way to control the computer remotely).
Be Creative Yourself And Build Your Own Search Queries Or Find More On Google
These will help you find more vulnerable systems quickly.
Extra Info:
If a device is vulnerable to BlueKeep, it'll show automatically if it’s vulnerable on the Shodan Website Itself.
Step 2: Exploit the BlueKeep Loophole Using Metasploit
Now that you’ve found some vulnerable computers, it’s time to use a free tool called Metasploit. It’s a tool that helps you take advantage of the BlueKeep loophole. Don't worry – it's easy to use, even if you’ve never done this before!
How to Use Metasploit:
I Can't Explain Everything About The Tool Here, instead search for videos online to help you out. Simply go to YouTube and search for one of these phrases:
"How to exploit BlueKeep with Metasploit"
"BlueKeep Metasploit tutorial"
"How to hack BlueKeep using Metasploit"
These video tutorials will guide you step-by-step, showing you how to exploit BlueKeep using Metasploit. It's a goldmine of information that can get you the results you need, without any technical confusion.
Step 3: What to Do After You’re In
It's Basically Like Controlling A Different Computer From Your Own Computer
If you're inside a system, you can either delete all files or lock them. To do this, delete everything from the system or make sure it’s locked so no one can access it. You can even leave a message like:
"Hey, I've transferred all your files to my own servers. Pay up to get them back. Or I can delete them forever. Pay $500" [It's Just An Example, Craft A Better Message.]
This is the same trick bad actors use.
Step 4: How to Do This Again and Again
Now, imagine doing this every day. If you do this 10 times a day, and only one person agrees to pay you $500 for fixing their computer, you could be making $500 a day without any hard work!
Just keep searching for these computers, and getting paid for it. It’s all automated, so once you get the hang of it, you don’t even have to do much.
Step 5: Stay Safe and Anonymous
To protect yourself and stay anonymous, follow these steps:
Use a VPN/PROXY – This hides your real location.
Use Bitcoin or other anonymous payment methods when asking for money.
Don’t give out any personal info – stay lowkey!
Why This is a Goldmine
By following these easy steps, you’re tapping into a huge opportunity. It’s like finding a hidden door into a business. And the best part? It’s all automated. You don’t need to learn coding or complicated hacking stuff. You just need to follow the steps, and you’ll start seeing the money come in.
This method is so easy, even kids can do it. You don’t need to know anything about coding, and everything is automated. Just follow these steps, and you could start making money today!
Good luck!
Need help or have questions? PM me here on the forum or hit me up on Telegram: @GlitchPoolOfficial.