Sunday 9 March 2014

Top 10 Ways To Hack Facebook

As far as today there are many known and unknown ways to hack facebook accounts.Here are some of the basic ways which are widely used to hack facebook.

NOTE:=
             "These are only for educational purpose.Don't use this hacks to damage anybody's account"

1.KEYLOGGING 

 Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. Keystroke logging, often referred to as keylogging or Keyboard Capturing, is the action of recording (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.[1] It also has very legitimate uses in studies of human-computer interaction. There are numerous keylogging methods, ranging from hardware and software-based approaches to acoustic analysis.Indeed a Keylogger is basically a small program which, once is installed on victim's computer, will record every thing victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.

2.PHISHING 


Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out phishing attack .Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.[1][2] Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used to lure unsuspecting public. Phishing emails may contain links to websites that are infected with malware.In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim login through the fake page the, the victims "Email Address" and "Password" is stored in to a text file, and the hacker then downloads the text file and gets his hands on the victims credentials.

3.STEALING  

Almost 80% percent people use stored passwords in their browser to access the Facebook.You can notice this is almost normal but the wrong thing goes here.There are some various where softwares which access our passwords and are indeed specially designed to capture the saved passwords stored in the victims Internet browser. 

4.SIDEJACKING WITH FIRESHEEP  

 Sidejacking attack went common in late 2010, however it's still popular now a days.Firesheep is an extension for the Firefox web browser that uses a packet sniffer to intercept unencrypted cookies from websites such as Facebook and Twitter. As cookies are transmitted over networks, so these are used to discover identities in the browser.Firesheep is widely used to carry out sidejacking attacks. Firesheep only works when the attacker and victim is on the same WiFi network. A sidejacking attack is basically another name for http session hijacking, but it's more targeted towards WiFi users.  

5.MOBILE PHONE HACKING  


Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are a lots of Mobile Spying softwares used to monitor a Cellphone. The most popular Mobile Phone Spying software's are: Mobile Spy, and Spy Phone Gold. 

6.USB HACKING 

 

If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the Internet browser.Auto-hacking USB drives simply contain applications that recover passwords. 

7.DNS SPOOFING  

DNS spoofing (or DNS cache poisoning) is a computer hacking attack, whereby data is introduced into a Domain Name System (DNS) name server's cache database, causing the name server to return an incorrect IP address, diverting traffic to another computer (often the attacker's).If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the Internet browser. 

8.BOTNETS 


A "botnet" is a collection of Internet-connected programs communicating with other similar programs in order to perform tasks.Botnets are not commonly used for hacking Facebook accounts, because of it's high setup costs. The infection process is same as the key logging, however a Botnet gives you additional options for carrying out attacks with the compromised computer. Some of the most popular "Botnets" include "Spyeye" and "Zeus."

9.MAN-IN-THE-MIDDLE-ATTACK 




The man-in-the-middle attack (often abbreviated MITM, MitM, MIM, MiM, MITMA) in cryptography and computer security is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them.If the victim and attacker are on the same LAN and on a switch based network, a hacker can place himself between the client and the server, or he could act as a default gateway and hence capturing all the traffic in between.

10.SESSION HIJACKING 


In computer science, session hijacking, sometimes also known as cookie hijacking is the exploitation of valid computer session—sometimes also called a session key—to gain unauthorized access to information or service in a computer system. In Session Hijacking attack, a hacker steals the victims browser cookie which is used to authenticate the user on a website, and use it to access the victims account. Session hijacking is widely used on LAN, and WiFi connections. 
  

 NOTE:=“Do not use this hack trick in any criminal activities and please do not destroy any ones account,
this is for educational purpose only”.

2 comments:

  1. I have used AVG security for a couple of years, and I'd recommend this solution to all of you.

    ReplyDelete

About Me:

Hey,there! Myself Chinmay Deshmukh.I have cleared JEE mains and currently pursuing my BE in [IT]in Institute of Engineering and Technology...