Top 8 Ways To Hack Facebook Accounts
There are various methods to hack facbook account password like Keyloggers, Phishing websites etc.. whereas bruteforcing, dictionary attacks, DDOS attack etc will not work directly due account lockout feature. Today in this post I am going to share a very effective way to hack facebook account I named it Top 10 ways to hack facebook accounts
8 Way To Hack Facebook
1. Facebook Phishing
Phishing still is the most popular attack vector used for hacking facebook accounts, There are variety of methods to carry out phishing attack, In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real facebook page and then asks the victim to login into that page, Once the victim logins through the fake page the victims "Email Address" and "Password" is stored in to a text file, The hacker then downloads the text file and get's his hands on the victims credentials.
I have explained the step by step phishing process in my post below:
2. Keylogging
Keylogging, according to me is the easiest way to hack a facebook password, Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A keylogger is basically a small program which once is installed on victims computer will record every thing which victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.
I have explained the step by step process in my post
How To Hack Facebook With keylogging
Session Hijacking can be often very dangerous if you are accessing Facebook on a http:// connection, In a Session Hijacking attack a hacker steals the victims browser cookie which is used to authenticate a user on a website and uses to it to access victims account, Session hijacking is widely used on Lan's. I have already written a three part series on How session hijacking works? and also a separate post on Facebook session hijacking.
Further Information
4. Sidejacking With Firesheep
Sidejacking attack went common in late 2010, however it's still popular now a days, Firesheep is widely used to carry out sidejacking attacks, Firesheep only works when the attacker and victim is on the same wifi network. A sidejacking attack is basically another name for http session hijacking, but it's more targeted towards wifi users.
To know more about sidejacking attack and firesheep, read the post mentioned below:
5. Mobile Phone Hacking
Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are lots of Mobile Spying softwares used to monitor a Cellphone.
The most popular Mobile Phone Spying softwares are:
6. DNS Spoofing
If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original facebook.com page to his own fake page and hence can get access to victims facebook account.
If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original facebook.com page to his own fake page and hence can get access to victims facebook account.
7. USB Hacking
If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the browser, I have also posted related to this attack which you can read by accessing the link below:
If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the browser, I have also posted related to this attack which you can read by accessing the link below:
8. Man In the Middle Attacks
If the victim and attacker are on the same lan and on a switch based network, A hacker can place himself b/w the client and the server or he could also act as a default gateway and hence capturing all the traffic in between, ARP Poisoning which is the other name for man in the middle attacks is a very broad topic and is beyond the scope of this article, We have written a couple of articles on man in the middle attacks which canb be accessed from the links mentioned below:
I have worked very hard on this post please leave comments if u like it
If the victim and attacker are on the same lan and on a switch based network, A hacker can place himself b/w the client and the server or he could also act as a default gateway and hence capturing all the traffic in between, ARP Poisoning which is the other name for man in the middle attacks is a very broad topic and is beyond the scope of this article, We have written a couple of articles on man in the middle attacks which canb be accessed from the links mentioned below:
If you are really interested in learning how man in the middle attacks, you can view the presentation
I have worked very hard on this post please leave comments if u like it
Thanks ..Nice Information
ReplyDeleteExcellent Job, very well written article & very easy to understand. :) (Khan)
ReplyDeleteGood job man..
ReplyDeletePerfectly written
goooooooood jobbbbbb thankxxxxx alottttt
ReplyDeleteGo0d J0b Man (y)
ReplyDeletebro what is the best method ?
ReplyDeletewhat is the easy method ?
if u dont know anything about hacking then use facebook phishing method
ReplyDeletemethod number 1
dit vind ik in mij ogen niet echt hacken je perse op het zelfde net zitten anders vang je bot
ReplyDeletewat voor mijn begrippen nou een echte hack zou wezen is als je gewoon willekeurige een account kan hacken door middel van alleen maar een verbinding te leggen
ReplyDeleteI agree with, of course, all of these varients of solving that issue are great, but as for me, it is much easier just to use this app http://copy9.com/how-to-install-mobile-spy-on-android-with-copy9/. It works very stable and good, try it.
Thanks for sharing. I never thought about it. Recently I started use this software http://mxspyphoneapp.com/ . I advise you to try. I'm on my experience I would say that I am calmer in my soul that I know where my children are. I do not wish that my children have got into bad company. Therefore it is necessary to go to extremes.
ReplyDelete