Powered by Blogger.

How To Hackers Hack Facebook And FB Hack Types

Want to Hack a Facebook – ways to hack a Facebook


Hi friends, Today i am going to tell you the famous methods to hack a Facebook account. Because many of my blog readers asked me on Facebook and E-mail to write an article to how to hack a Facebook account  :) So i am thinking about that and write this post So enjoy it. But Don’t do anything illegal. This post is only for education purpose only.
In this article, i am going to write about the 5 Best attacks made for the Facebook hacking. I am also going to tell you about the Preventions and the disadvantages/Drawbacks of that particular attack.

1. Hack a Facebook by Phishing

This is one of the very basic way of hacking a Facebook account not only Facebook but also all the other sites. Phishing is creating a fake webpage to steal user’s details like username,Password,email,Phone number and etc
Drawbacks
  • Users nowadays are so familler with these types of attacks because this is a basic attack. So peoples con not be easily fooled using this attack. You need to work hard to fool someone.
Prevention
  • Always Check the URL before entering your details. This is best way to avoid phishing. A spelling mistakes lead you to loose your details.
  • Using a Good and updated ( a current version) of an antivirus is help to protect your details from a phishing sites. Antivirus Warns you when you visit a phishing site.
  • If you already enter your details in a phishing site change you password immediately to protect yourself
fb phissing

2. Key logger (key Loging)

This is also a good way to hacking sites like Facebook. in this type the attack hacker sends you an infected file with the key logger in to the victim. if the victim opens that file on the Pc or device that he uses then the device is on the control of the hacker Whatever he types will be mailed or uploaded to hacker’s sever
Advantages
  • Victim won’t know that the device is in the control of the hacker. The hacker getting every bit of data he types.
  • The hacker not only get the details of Facebook but also all the details of the victim (all the account details used in that device)
Drawbacks
  • These key loggers are often detected by the good antivirus programs. so the hacker must be create the updated key loggers often.
Prevention
  • Only execute the files only if you get it from the trusted persons.
  • Use online scanners such as novirustanks.org
  • Using a Good and updated ( a current version) of an antivirus is help to protect your details from a phishing sites. Antivirus Warns you when you visit a phishing site.

 3. Trojans/backdoors

This is an advanced level topic. It consists of a server and a client. In this type of attack the attacker sends the infected server to the victim. After execution the infected server i.e. Trojan on the victim’s PC opens a backdoor and now the hacker can do whatever he wants with the victim’s PC. The main difference between key logger and this is by this method you can control the Pc but by the key loggers you can’t control the device

Drawbacks
  • These Trojans  are often detected by the good antivirus programs. so the hacker must be create the updated Trojan often.
Prevention
  • Only execute the files only if you get it from the trusted persons.
  • Use online scanners such as novirustanks.org
  • Using a Good and updated ( a current version) of an antivirus is help to protect your details from a phishing sites. Antivirus Warns you when you visit a phishing site.

4. Sniffing

It consists of stealing session in progress. In this type of attack an attacker makes connection with server and client and relays message between them, making them believe that they are talking to each other directly.
Drawbacks
  • If the user is logged out then the attacker is also logged out because the session is lost.
  • It is difficult to sniff on SSL protected networks
Prevention
  • Always use SSL secured connections.
  • Always keep a look at the url if the http:// is not changed to https:// it means that sniffing is active on your network.
Diagram-Describing-Blind-XSS-Attack

5. Social Engineering

This method includes guessing and fooling the clients to give their own passwords.In this type of attack, a hacker sends a fake mail which is very convincing and appealing and asks the user for his password. Answering the security questions also lies under this category.
Drawbacks
  • It is not easy to convince someone to make him give his password.
  • Don’t believe in any sort of emails which asks for your password.
  • Guessing generally doesn't always work ( Although if you are lucky enough it may work!).
Prevention
  • Never give your password to anyone.
  • Don’t select easy security questions which can easily guessed

6. Session Hijacking

In a session hijacking attack an attacker steals victims cookies, cookies stores all the necessary logging Information about one’s account, using this info an attacker can easily hack anybody’s account. If you get the cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Facebook, Google, Yahoo.
There is also Spoofing Cookies to hack Facebook this is a post by me by session hijacking
Drawbacks
  • You will be logged out when user is logged out.
  • You will not get the password of the user’s account.
  • Will not work if the user is using HTTPS connections.
Prevention
  • Always work on SSL secured connections.
  • Always keep a look at the url if the http:// is not changed to https:// it means that sniffing is active on your network
Some Common passwords that you can try on your friends are :

1. Their mobile number or their girlfriend or boyfriend mobile number. (always try his previous or old mobile number as they are not as much as fool that they appears)

2. Their Girlfriend or boyfriend names or their own names concatenating with their Girlfriend or boyfriend names.

3. Date of births

4. Their favorite movie names , cartoon character names or favorite music band names or simply the hero names like batman,dark knight, Superman,Godzilla, Spartacus and much more..

5. Most important now most website ask that password should be alphanumeric now what users do they just 
adds 1,2,3 in their normal passwords and some more smart guys adds !,@,# in their passwords and amazingly all in Sequence.

Note : the above common passwords are not from any internet resource, its by my own case study that i have come to conclusion after hacking 19,788 emails accounts. I know now you want to know how i hacked so much accounts. As i have already mentioned for advanced hackers second option is best and the only thing that i did was just made my Keylogger USB and pendrive spreadable. Who ever used the infected USB drive also got infected and this procedure goes so on. And last what happened  my 10Gb free storage was filled and i don't have enough time to clean it regularly. 
Note:- This tutorial is for educational purpose only and may not be used for any blackhat purpose. The prime aim of this tutorial is to create awareness so that you guys can protect yourself from getting hacked.
Share on Google Plus

About Harsh Chaklasiya

This is a short description in the author block about the author. You edit it by entering text in the "Biographical Info" field in the user admin panel.

Popular Posts

Like Us HackGiri

Download Our New Toolbar

Get our toolbar!