img

Best ways to Hack Facebook

/
/
/
1355 Views

Everybody is so much familiar with facebook and also about its huge amount of data storage. Facebook is one of the most widely used social networking sites, with more than 750 million users, as a reason if which it has become the number one target of hackers. So, HACKAGON will show the Best ways to Hack Facebook so that the readers of HACKAGON will stay aware from hackers and protect their facebook account from getting hacked.

Best ways to Hack Facebook Hackagon

So, know the top 10 methods of How Hackers Can Hack Facebook Account Password:

1# Phishing:

Phishing is the most popular assault vector utilized for hacking Facebook accounts. There are variety methods to carry out phishing attack. In a simple phishing attacks, a hacker creates a fake login page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim logs in through the fake page the, the victims credentials like “Email Address” and “Password” is stored into a text file, and the hacker then downloads the text file and gets his hands on the victims credentials.

To make it simple, let’s say that facebook phishing is a way to make and create fake facebook website according to the real website for negative purposes, such as stealing credentials, data, etc.

2# Keylogging:

A keylogger is a suspicious program that record your keystrokes, Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A Keylogger is basically a small program which, once installed on victim’s computer, will record everything victim types on his/her computer. The logs are then sent back to the attacker by either FTP or directly to hackers email address. Some advanced keylogger’s are also there which can even take the screenshot of the victim’s desktop.

3# Stealers:

Almost 80% percent of facebook users uses stored password in their browser to access the Facebook. This is quite convenient, but can sometimes be extremely dangerous. Stealers are software specially designed to capture the saved passwords stored in the victim’s Internet browser.

4# Session Hijacking & Cookie Stealing:

Session Hijacking & Cookie Stealing can be exceptionally perilous if you are accessing Facebook on an HTTP (nonsecure) connection. In Session Hijacking attack, a hacker steals the victim’s browser cookie which is used to authenticate the user on a website and use it to access the victims account. Session hijacking is widely used on LAN and WiFi connections.

The cookie which facebook uses to authenticate its users is called “Datr”, If an attacker can get hold of your authentication cookies, All he needs to do is to inject those cookies in his browser and he will gain access to your account. This is how a facebook authentication cookie looks like:
Cookie: datr=1276721606-b7f94f977295759399293c5b0767618dc02111ede159a827030fc;

An attacker can use a variety of methods in order to steal your facebook authentication cookies depending upon the network he is on, If an attacker is on a hub based network he would just sniff traffic with any packet sniffer and gain access to victims account or If an attacker is on a Switch based network he would use an ARP Poisoning request to capture authentication cookies, If an attacker is on a wireless network he just needs to use a simple tool called Firesheep in order to capture authentication cookie and gain access to victims account.

5# Sidejacking:

Sidejacking attack is basically another name for HTTP session hijacking, but it’s more targeted towards WiFi users. It went common in late 2010, however, it’s still popular nowadays.

Sidejacking Attack Involves two Major Steps:

  • Capturing packets (Session Cookie): There are a wide variety of tools available that can Sniff packets containing “session cookies“. Use any packet sniffer such as Wireshark to sniff the packets between the target IP and the host. These tools can capture packets such as POST or GET requests used by Web browsers to send and receive data from the HOST. But we are mainly interested in grabbing the cookies, so carefully take out the cookie information from the sniffed Packets. Popular packet Sniffers: WireShark, Ethereal, etc.
  • Using Captured Session Cookie: Once you have the cookie information, the next task is to use this information to get access to victims user account. Using Sniffed Cookie you can actually log into your victims account even without knowing his/her password. To do this, you will require browser plugin that can manage and edit cookies. For firefox Browser, you can use Cookie Manager+ or Edit Cookies to do this task. Chrome users can checkout: Edit This Cookie or Cookie Manager.

To simplify this Task, Mr.Eric Butler a software engineer introduced a firefox extension called Firesheep. It is widely used to carry out sidejacking attacks but it only works when the attacker and victim are on the same WiFi network.

6# Mobile Phone Hacking:

Besides PC/Laptops, Billions of Facebook users access Facebook through their Smartphones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. There are a bunch of Mobile Spying software’s used to monitor a Cellphone. The most popular Mobile Phone Spying software’s are:

  • Mobile Spy
  • Spy Phone Gold.

7# DNS Spoofing:

In DNS Spoofing attack if both, the victim and attacker are on the same network then an attacker can use a DNS spoofing attack and change the original Facebook page to his own fake page and hence can get access to victims Facebook account.

Basically, DNS spoofing (or DNS cache poisoning) is a computer hacking attack, whereby data is introduced into a Domain Name System (DNS) resolver’s cache, causing the name server to return an incorrect IP address, diverting traffic to the attacker’s computer (or any other computer).

8# USB Hacking:

In USB Hacking attacks, if an attacker has physical access to your computer, he could just insert a programmed USB with a function to automatically extract saved passwords in the Internet browser.

For USB Hacking attack you need two things:

  • A USB Drive devoted to this.
  • The programs and files with the capability of consequently concentrating the spared passwords.

9# Man In the Middle Attack:

In Man In The Middle Attack, if the victim and attacker are on the same LAN and on a switch based network then a hacker can place himself between the client and the server, or he could act as a default gateway and hence capturing all the traffic in between.

Basically, In cryptography and computer security, A Man In The Middle Attack (often abbreviated to MITM, MitM, MIM, MiM or MITMA) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

10# Botnet:

Botnets are not commonly used for hacking Facebook accounts, because of it’s high setup costs. They are used to carry more advanced attacks. A Botnet is basically a collection of compromised computer. The infection process is same as the key logging, however, a Botnet gives you additional options for carrying out attacks with the compromised computer. Some of the most popular Botnets include Spyeye and Zeus.

Basically, A botnet is a collection of compromised computers often referred to as “zombies” infected with malware that allows an attacker to control them.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

Hope you like this article. So, don’t forget to share it with your friends and also feel free to drop a comment below if you still have any query or update related to this.

  • Facebook
  • Twitter
  • Google+
  • Linkedin
  • Pinterest

8 Comments

  1. Hello EssieMWeng, There are different kind of captcha plugins like picture captcha, math captcha, etc so I don’t know specifically what kind of captcha you want for your website but if you’ll ask me I’ll suggest Captcha by BestWebSoft which is a free and best plugin as I found till date.

    Hope we matched your expectations & it’s never the off topic so feel free to ask any kind of query you have.
    Thanks a lot for engaging with us. . .Visit Again.

  2. Hi there, I discovered your website via Google while trying to
    find a comparable matter, your site got here up, it
    looks great. I have got bookmarked it during my google bookmarks.

    Hi there, simply become alert to your weblog through Google, and located that it really is truly informative.
    I am going to watch out for brussels. I will be grateful in the event you proceed this from now on. Numerous folks will be
    benefited through your writing. Cheers!

  3. Good write-up, I?¦m regular visitor of one?¦s blog, maintain up the excellent operate, and It’s going to be a regular visitor for a lengthy time.

  4. Its like you read my mind! You seem to know a lot about this,
    like you wrote the book in it or something. I think that
    you could do with a few pics to drive the message home a bit, but
    instead of that, this is wonderful blog. A great read.

    I will definitely be back.

  5. Quality content may be the secret to become a focus for the people to pay a
    simple visit the site, that’s what this website is providing.

Leave a Reply to ClintCJanish Cancel reply