As far as today there are many known and unknown ways to hack facebook accounts.Here are some of the basic ways which are widely used to hack facebook.
NOTE:=
"These are only for educational purpose.Don't use this hacks to damage anybody's account"
Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out phishing attack .Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.[1][2] Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used to lure unsuspecting public. Phishing emails may contain links to websites that are infected with malware.In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim login through the fake page the, the victims "Email Address" and "Password" is stored in to a text file, and the hacker then downloads the text file and gets his hands on the victims credentials.
The man-in-the-middle attack (often abbreviated MITM, MitM, MIM, MiM, MITMA) in cryptography and computer security is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them.If the victim and attacker are on the same LAN and on a switch based
network, a hacker can place himself between the client and the server,
or he could act as a default gateway and hence capturing all the traffic
in between.
NOTE:=“Do not use this hack trick in any criminal activities and please do not destroy any ones account,
NOTE:=
"These are only for educational purpose.Don't use this hacks to damage anybody's account"
1.KEYLOGGING
Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. Keystroke logging, often referred to as keylogging or Keyboard Capturing, is the action of recording (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.[1] It also has very legitimate uses in studies of human-computer interaction. There are numerous keylogging methods, ranging from hardware and software-based approaches to acoustic analysis.Indeed a Keylogger is basically a small program which, once is installed on victim's computer, will record every thing victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.
2.PHISHING
Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out phishing attack .Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.[1][2] Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used to lure unsuspecting public. Phishing emails may contain links to websites that are infected with malware.In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim login through the fake page the, the victims "Email Address" and "Password" is stored in to a text file, and the hacker then downloads the text file and gets his hands on the victims credentials.
3.STEALING
Almost 80% percent people use stored passwords in their browser to access the Facebook.You can notice this is almost normal but the wrong thing goes here.There are some various where softwares which access our passwords and are indeed specially designed to capture the saved passwords stored in the victims Internet browser.
4.SIDEJACKING WITH FIRESHEEP
Sidejacking attack went common in late 2010, however it's still popular now a days.Firesheep is an extension for the Firefox web browser that uses a packet sniffer to intercept unencrypted cookies
from websites such as Facebook and Twitter. As cookies are transmitted
over networks, so these are used to discover identities in the browser.Firesheep is widely used to carry out sidejacking attacks. Firesheep
only works when the attacker and victim is on the same WiFi network. A
sidejacking attack is basically another name for http session hijacking,
but it's more targeted towards WiFi users.
5.MOBILE PHONE HACKING
Millions of Facebook users access Facebook through their mobile phones.
In case the hacker can gain access to the victims mobile phone then he
can probably gain access to his/her Facebook account. Their are a lots
of Mobile Spying softwares used to monitor a Cellphone. The most popular
Mobile Phone Spying software's are: Mobile Spy, and Spy Phone Gold.
6.USB HACKING
If an attacker has physical access to your computer, he could just
insert a USB programmed with a function to automatically extract saved
passwords in the Internet browser.Auto-hacking USB drives simply contain applications that recover passwords.
7.DNS SPOOFING
DNS spoofing (or DNS cache poisoning) is a computer hacking attack, whereby data is introduced into a Domain Name System (DNS) name server's cache database, causing the name server to return an incorrect IP address, diverting traffic to another computer (often the attacker's).If an attacker has physical access to your computer, he could just
insert a USB programmed with a function to automatically extract saved
passwords in the Internet browser.
8.BOTNETS
A "botnet" is a collection of Internet-connected programs communicating with other similar programs in order to perform tasks.Botnets are not commonly used for hacking Facebook accounts, because of it's high setup costs. The infection process is same as the key logging, however a Botnet
gives you additional options for carrying out attacks with the
compromised computer. Some of the most popular "Botnets" include "Spyeye"
and "Zeus."
9.MAN-IN-THE-MIDDLE-ATTACK
10.SESSION HIJACKING
In computer science, session hijacking, sometimes also known as cookie hijacking is the exploitation of valid computer session—sometimes also called a session key—to gain unauthorized access to information or service in a computer system. In Session Hijacking attack, a hacker steals the victims browser cookie
which is used to authenticate the user on a website, and use it to
access the victims account. Session hijacking is widely used on LAN, and
WiFi connections.
wow I like it
ReplyDeleteI have used AVG security for a couple of years, and I'd recommend this solution to all of you.
ReplyDelete