I am assuming by handle you mean username and not email address. e.g. the handle “whitecarnations” and not the address “whitecarnations4788@gmail.com” or some other address.
As an example I will use the handle “whitecarnations” for my explanation, and I will explain it as if I am the hacker trying to hack you. The reason for this is I am operating under the assumption that you are not going to try and hack anyone, but rather are worried about being hacked. Also, I am assuming that the would be hypothetical hacker has no contact with you in real life and no access physically to your machine. So this will maybe help you understand the situation a little better.
If all you have is a user name or handle and not an actual address, then here is how you could potentially try to hack that persons email address.
.
Step 1 – Research:
If someone has the handle “whitecarnations” you could go to yahoo, gmail, hotmail and other email providers to see if “whitecarnations@hotmail.com” is taken by someone. If it is taken, then see if “whitecarnations2@hotmail.com” and “whitecarnations3@hotmail.com” and “whitecarnations777@hotmail.com” or “whitecarnations_art@hotmail.com” are taken. If they are not, excellent! I would now have a good guess what your email address is. However, if they are taken, then any of them could be you and that is no help.
If there is more than 1 email with whitecarnations in it, then you are going to have a hard time verifying what email address is your actual email. In this event you will need to go to google and search for “whitecarnations” and cross your fingers that instead of loads of info on flowers you actually find some info on you. Maybe you joined a forum as “whitecarnations” and told people on one thread that you use fluther, thus allowing it to be verified you are the same person, and maybe you told them all by posting in a public place that your email is “whitecarnations99@hotmail.com” or some other address, if you did, I now know your address, but if you have not done that then I still would not know your address and would have to do more work to find out.
At this point, if I still don’t have your address, then my best bet is probably going to be to stalk you online. I know you are a member of Fluther, and I can see what you are more or less interested in from your profile. I could make a fake Fluther account, start asking and answering questions, and in a few weeks, when I look like a genuine user, just happen to decide to press the follow button on your profile and send you a private message intorducing my self. We talk, I get to be your friend slowly, and one day get your email address when you trust me enough to give it to me.
If you still don’t give me your email address, then all I can do is stalk and wait, but for sake of argument, lets assume I manage to get your email address from you.
Setp 2 – Hack:
Now that I know a little about you and have your email address, I can finally try to hack the account. The first thing to try, as previously mentioned, is to just guess. Based on 5 minutes of google research and a little clicking around on your profile, I would go ahead and guess with passwords like “carolpaint, carolpaint1, CarolMarinePaint9, annie, anniepaint, ilovemusic999, photo, photography, photosaremylife, etc” by entering them manually, you never know a little poke could always be enough. Failing that, and chances are it would fail, I have to basically take the same approach and guess every combination possible. You could use a bot or some automated program to do the guessing, but because of safety features, I will probably still wind up entering in the combinations manually. I have been told there are automated programs for brute force hacking, but am yet to see one working on a modern site with modern security.
As guessing the password is going to be a pain in the ass, the best thing to do again would be to try and trick you. There are a few options for this, but I would probably go with trying to use a key logger. I would basically need to send you an email with a little virus-like software attached. You think im sending you “that video game I told you about”, but really its a program that looks at what keys you press and then reports back to me in secret what you have typed in lately in the form of a text document. I then look for some text that looks like your password, and if I see something like you have typed that looks something like the following “www.hotm DownKey, Enter, whiteca DownKey MouseClick Ilovemusic909” then I would try “ilovemusic909” for a password. If it works then I’m in, if not, keep on waiting for more key logger reports.
If they key logger fails, then I can try to trick you other ways. One other way would be physhing, a similar logic to the keylogger, I send you an email that looks like its from your email provider asking you to log in, but really it is a fake site that just reports your password back to me.
Failing that, I give in. Whatever is in your email is not going to be worth all this effort to me, and I stop trying to hack.
There could be other methods, but I have not heard of any others yet.