It has been a very long time ( almost 5 years ) since a new and stable bruteforcer ( actually the way we people use is a "dictionary attack" method ) has been taken into consideration. It's not my willing to disrespect the other icq bruteforcers that has come to our attention , however , IPD seems to be far the best still. Time changes,new methods are discovered,new ideas shown up,legends have only slept,they never died. Finally,after some tests I can tell you that we have a unique bruteforcer that can take its rightful place and shake the domination of others. Project is being handled still by our team NWPX , but the results are astonishing. Depending on your connection,lowest PPS you can see is 5 ( with my 256 DSL connection ) with 16 threads, and the maximum we witnessed till that time is 150 (Max. PPS on the screenshot is bugged ) This unique program does not need to use any type of Proxy , therefore it's stable , much faster and user friendly. It has a simple GUI because it is coded to reach even the newest customers that has no knowledge at all about this stuff. I am not supposed to give further information about technical details as you could appreciate,however,it is not possible for it to be published in public in near future.There's high chance we will value it by our VIP customers , after some time , we may publish a limited demo version about what you lose by not owning it. FAQ: Q: Does the bruteforcer use any type of Proxy? A: No but you can use a proxy if you like , it runs both using your own IP or proxy. Q: Can I brute just a single UIN with a wordlist? A: No, because of the special method the bruteforcer uses, you'll not be able to just brute 1 UIN at a time. Q: Can I brute a range of UINs with a single password or a wordlist? A: Yes. Q: Where can I download the bruteforcer? A: As for now the bruteforcer is in an experimental stage. We'll let you know when there is a final version. Q: How does the new method work? A: To guarantee the longlivity and continuity of this project we decided to not reveal it. Q:How may I become a beta tester of this product? A:You can't , it'll not be given out except the facts mentioned above. Respect to famous bugtraqer Nuker ( # 10072 ) for finding the bug and Respect to whole NWPX Team. [No Need In Such An Awful Translation]
i'm not a specialist , but imho , it's some kind of fake, like Skype Exploit on Perl. But if i'm wrong That would be a serious threat to icq users time comes we'll see.