Skip to main content

Top 10 Ways To Hack Facebook

As far as today there are many known and unknown ways to hack facebook accounts.Here are some of the basic ways which are widely used to hack facebook.

NOTE:=
             "These are only for educational purpose.Don't use this hacks to damage anybody's account"

1.KEYLOGGING 

 Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. Keystroke logging, often referred to as keylogging or Keyboard Capturing, is the action of recording (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.[1] It also has very legitimate uses in studies of human-computer interaction. There are numerous keylogging methods, ranging from hardware and software-based approaches to acoustic analysis.Indeed a Keylogger is basically a small program which, once is installed on victim's computer, will record every thing victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.

2.PHISHING 


Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out phishing attack .Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.[1][2] Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used to lure unsuspecting public. Phishing emails may contain links to websites that are infected with malware.In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim login through the fake page the, the victims "Email Address" and "Password" is stored in to a text file, and the hacker then downloads the text file and gets his hands on the victims credentials.

3.STEALING  

Almost 80% percent people use stored passwords in their browser to access the Facebook.You can notice this is almost normal but the wrong thing goes here.There are some various where softwares which access our passwords and are indeed specially designed to capture the saved passwords stored in the victims Internet browser. 

4.SIDEJACKING WITH FIRESHEEP  

 Sidejacking attack went common in late 2010, however it's still popular now a days.Firesheep is an extension for the Firefox web browser that uses a packet sniffer to intercept unencrypted cookies from websites such as Facebook and Twitter. As cookies are transmitted over networks, so these are used to discover identities in the browser.Firesheep is widely used to carry out sidejacking attacks. Firesheep only works when the attacker and victim is on the same WiFi network. A sidejacking attack is basically another name for http session hijacking, but it's more targeted towards WiFi users.  

5.MOBILE PHONE HACKING  


Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are a lots of Mobile Spying softwares used to monitor a Cellphone. The most popular Mobile Phone Spying software's are: Mobile Spy, and Spy Phone Gold. 

6.USB HACKING 

 

If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the Internet browser.Auto-hacking USB drives simply contain applications that recover passwords. 

7.DNS SPOOFING  

DNS spoofing (or DNS cache poisoning) is a computer hacking attack, whereby data is introduced into a Domain Name System (DNS) name server's cache database, causing the name server to return an incorrect IP address, diverting traffic to another computer (often the attacker's).If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the Internet browser. 

8.BOTNETS 


A "botnet" is a collection of Internet-connected programs communicating with other similar programs in order to perform tasks.Botnets are not commonly used for hacking Facebook accounts, because of it's high setup costs. The infection process is same as the key logging, however a Botnet gives you additional options for carrying out attacks with the compromised computer. Some of the most popular "Botnets" include "Spyeye" and "Zeus."

9.MAN-IN-THE-MIDDLE-ATTACK 




The man-in-the-middle attack (often abbreviated MITM, MitM, MIM, MiM, MITMA) in cryptography and computer security is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them.If the victim and attacker are on the same LAN and on a switch based network, a hacker can place himself between the client and the server, or he could act as a default gateway and hence capturing all the traffic in between.

10.SESSION HIJACKING 


In computer science, session hijacking, sometimes also known as cookie hijacking is the exploitation of valid computer session—sometimes also called a session key—to gain unauthorized access to information or service in a computer system. In Session Hijacking attack, a hacker steals the victims browser cookie which is used to authenticate the user on a website, and use it to access the victims account. Session hijacking is widely used on LAN, and WiFi connections. 
  

 NOTE:=“Do not use this hack trick in any criminal activities and please do not destroy any ones account,
this is for educational purpose only”.

Comments

  1. I have used AVG security for a couple of years, and I'd recommend this solution to all of you.

    ReplyDelete
  2. Ever wanted to get free Twitter Followers?
    Did you know you can get them ON AUTO-PILOT & ABSOLUTELY FOR FREE by registering on Like 4 Like?

    ReplyDelete
  3. QUANTUM BINARY SIGNALS

    Get professional trading signals delivered to your mobile phone daily.

    Follow our signals NOW and make up to 270% a day.

    ReplyDelete
  4. BlueHost is definitely the best hosting company for any hosting plans you need.

    ReplyDelete
  5. If you need your ex-girlfriend or ex-boyfriend to come crawling back to you on their knees (no matter why you broke up) you must watch this video
    right away...

    (VIDEO) Get your ex back with TEXT messages?

    ReplyDelete

Post a Comment

Popular posts from this blog

How to make 50$ per day using Instagram

Instagram has been the talk of the town and all for the right reasons. It's one of the best mediums for Affiliate Marketing. If you're new to CPA, then Instagram is really the best place to start with it. Keep in mind that no matter how much I spoonfeed information to you here, you are gonna have to put some effort into it to see results. Why? - There's thousands of people already doing but there's money for everyone.

A little history - I got back into Internet Marketing 7 months ago and decided to try out Instagram as everyone was doing it. And my first choice was OGads obviously. In the past 7 months I've made over $11,000 using Instagram so it's safe to say I know what am talking about. :)
What you need to get started - 
1. Account on OGads - These guys are currently the best Mobile CPA network and you're gonna want to be a part of them. Very good offers and very helpful staff.
Signup to OGads - http://ogads.com/ 

2. Bot to run Instagram accounts - I personal…

Hacker (Computer Security)

In the PC security connection, a programmer is somebody who looks for and abuses shortcomings in a PC framework or PC system. Programmers may be propelled by a large number of reasons, for example, benefit, dissent, challenge. enjoyment or to assess those shortcomings to help with evacuating them. The subculture that has developed around programmers is regularly alluded to as the PC underground and is currently a known community.While different employments of the word programmer exist that are identified with PC security, for example, alluding to somebody with a propelled comprehension of PCs and PC networks,they are seldom utilized as a part of standard connection. They are liable to the longstanding programmer definition discussion about the term's actual importance. In this debate, the term programmer is recovered by PC software engineers who contend that somebody who breaks into PCs, whether PC criminal (dark caps) or PC security master (white hats),is all the more fittingly…