How To Hack a Gmail


You have various options if you want to hack your own or someone else’s Gmail account (with permission, of course). This wikiHow teaches you how to break into a Gmail account using tools such as keyloggers, packet sniffers, and your web browser’s password manager. Remember that hacking into someone else’s email account is unethical and illegal in most countries, so proceed at your own risk.

Method 1: Controlling Your Expectations

1. Recognize your limitations. Gmail is a highly secure service. The only method to “hack” into someone’s account is to acquire their password. If your target uses two-factor authentication, you will also need their mobile device. There is no alternative to two-factor authentication.

2. Recognize the legality. It is strictly prohibited to gain unauthorized access to another person’s email account. This article is solely for educational purposes.

Method 2: Making Use of a Keylogger

1. Locate a keylogger program that meets your requirements. A keylogger is a program that records keystrokes on the computer on which it is installed. Several keylogger applications are available online for free or for purchase, with differing degrees of stealthiness. Make sure to research all of your options thoroughly. Popular shows include:

  • Genuine Keylogger
  • Keylogger Spyrix Free
  • BlackBox Express
  • KidLogger
  • NetBull
  • Lola

2. Put the keylogger on the target’s PC. This will necessitate administrator privileges on the target’s machine. The password is “admin” or “blank.”

  • The procedure for installing the keylogger differs based on the program.
  • It is prohibited to install a keylogger without the other person’s knowledge.

3. Fire up the keylogger service. Start the service so it can start capturing keystrokes. The procedure will differ based on the program you’re using. You may have to customize the software to record keys if it has many functionalities.

4. Allow the keylogger to operate when the victim uses the computer. The keylogger will most likely record a large amount of data. Filtering can be done based on the window that the user is typing in.

5. Examine the logs. Some keyloggers will send logs to your email address. Others will require you to export them from the machine the program is now executing. Examine the records until you uncover what you believe to be the target’s Gmail password. You might be able to filter results based on the Gmail login page.

  • If the keylogger does not give you the logs via email, you must visit the application on the computer where it was installed.

Method 3: Using the Password Manager in the Browser

1. Launch the web browser on your target’s PC. You must be able to access that person’s computer. Try it when they’re not in the room or know you’ll have a few minutes alone.

  • To launch the default browser, click a link in an email or the Help menu.

2. Open the password manager. The procedure for accessing the password manager varies based on the browser.

  • Internet Explorer – Select “Internet Options” from the Tools menu or the Gear button. Click the “Content” tab, then the “AutoComplete” section’s “Settings” button. From the new window, select “Manage Passwords.”
  • Select “Settings” from the Chrome Menu button (). Scroll down to the “Passwords and forms” section after clicking the “Show advanced settings” link. “Manage passwords” will appear.
  • Firefox – Select “Options” from the Firefox Menu button (). Click the “Security” tab, followed by “Saved Passwords.”
  • Safari – Select “Preferences” from the Safari menu. Navigate to the “Passwords” tab.

3. Determine your target’s Google account password. Search for “google” in the password manager’s search bar. This is the most efficient method for narrowing down the list of passwords. For the target’s Gmail address, look for the “” entry.

4. Show the password. After selecting the password, click the “Show” or “Show Password” button. Before the credentials are displayed, you may be required to enter the computer’s administrator password.

5. A note of the password and then exit the password manager. Make a note of both the password and the precise Gmail address. To keep your tracks clean, close the password manager after finishing.

6. Try the password on a different computer. You should be able to access the account if the target has not configured two-factor authentication. The target will most likely be told that login from an unknown browser has occurred.

If the target has enabled two-factor authentication, you will need the code given to their mobile device. If it’s turned on, there’s no getting around it.

Method 4: Make Use of a Packet Sniffer

1. Be aware of the procedure. When a user logs into Gmail (or any other login service), a file known as a “cookie” is downloaded to their computer. This cookie enables the user to remain logged in even after leaving Gmail. Cookies can be detected using a packet sniffer while being sent over a wireless network. If you discover a Gmail cookie, you can open it on your computer and perhaps gain access to your target’s mailbox. It would help if you were linked to the same wireless network as your target.

  • If your target uses encryption (HTTPS://), this method will not work. Because this is enabled by default in Gmail, its utility is restricted.
  • It is prohibited to use a packet sniffer to intercept traffic on a public network.

2. Get and install Wireshark. Wireshark is a free network monitoring program available at It is compatible with Windows, Mac, and Linux. Installing Wireshark is an essential process. As with most programs, follow the prompts.

  • Ensure that the TShark component is installed during the installation process. This is required for obtaining cookies over a wireless network. You’ll also need to download and install “WinPcap.”

3. Get a Cookie Cadger. This Java software will detect and intercept cookies delivered over a wireless network. Cookie Cadger does not require installation. It operates the same way in all operating systems.

  • To use Cookie Cadger, you must have Java 7 installed on your computer. Java can be downloaded via For further information, see How to Install Java.

4. Join the same wireless network to which your target is connected. It would be best to be linked to the same wireless network as your target. This means you’ll have to be nearby.

5. Open Wireshark. Cookie Cadger will not function unless Wireshark is running.

6. Launch Cookie Cadger and choose your wireless adaptor. From the drop-down menu, select the adapter linked to the wireless network. The mainframe should fill with unprotected cookies from other persons on the web.

7. To find Google cookies, use the domain filter. The second column will show a list of domains for which Cookie Cadger is looking for cookies. Keep an eye out for Google domains, particularly

  • Keep in mind that this only works if the destination is not using https. You will not be able to find the cookie if their connection is secure.

8. When you find a Gmail cookie, click “Replay This Request.” The cookie will be loaded into your web browser due to this action. The correct cookie will bring you to the target’s inbox.

  • When the person logs out, you will no longer be able to access their Gmail.


Please enter your comment!
Please enter your name here