Skip to main content

Top 10 Facebook profile Hacking techniques!

There are many ways someone can hack Facebook Profile’s, and here are the 10 most usual:

1. Phishing
Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out phishing attack. In a simple phishing attacks a hacker creates a fake log in page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim log in through the fake page the, the victims “Email Address” and “Password” is stored in to a text file, and the hacker then downloads the text file and gets his hands on the victims credentials.

2. Keylogging
Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A Keylogger is basically a small program which, once is installed on victim’s computer, will record every thing victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.

3. Stealer’s
Almost 80% percent people use stored passwords in their browser to access the Facebook. This is quite convenient, but can sometimes be extremely dangerous. Stealer’s are software’s specially designed to capture the saved passwords stored in the victims Internet browser.

4. Session Hijacking
Session Hijacking can be often very dangerous if you are accessing Facebook on a http (non secure) connection. In Session Hijacking attack, a hacker steals the victims browser cookie which is used to authenticate the user on a website, and use it to access the victims account. Session hijacking is widely used on LAN, and WiFi connections.

5. Sidejacking With Firesheep
Sidejacking attack went common in late 2010, however it’s still popular now a days. Firesheep is widely used to carry out sidejacking attacks. Firesheep only works when the attacker and victim is on the same WiFi network. A sidejacking attack is basically another name for http session hijacking, but it’s more targeted towards WiFi users.

6. Mobile Phone Hacking
Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are a lots of Mobile Spying software’s used to monitor a Cellphone. The most popular Mobile Phone Spying software’s are: Mobile Spy, and Spy Phone Gold.

7. DNS Spoofing
If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original Facebook page to his own fake page and hence can get access to victims Facebook account.

8. USB Hacking
If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the Internet browser.

9. Man In the Middle Attacks
If the victim and attacker are on the same LAN and on a switch based network, a hacker can place himself between the client and the server, or he could act as a default gateway and hence capturing all the traffic in between.

10. Botnets
Botnets are not commonly used for hacking Facebook accounts, because of it’s high setup costs. They are used to carry more advanced attacks. A Botnet is basically a collection of compromised computer. The infection process is same as the key logging, however a Botnet gives you additional options for carrying out attacks with the compromised computer. Some of the most popular Botnets include Spyeye and Zeus.

For more information ! click here !
keep calm for the steps to hack facebook keep visit us!

Comments

Popular posts from this blog

COMPUTER ASSISTED KNEE REPLACEMENT

  COMPUTER ASSISTED KNEE REPLACEMENT What is Knee Replacement Surgery? Knee Replacement is a surgical procedure for replacing the damaged area of the knee joint. A component of metal and plastic is used to replace the damaged area of the knee joint. Through this Knee Replacement Surgery, the patient can relieve pain and disability. Computer Assisted Knee Replacement A computer is utilized to achieve the desired accuracy during a knee replacement surgery .  How does Knee Replacement work? The crucial part of the knee replacement surgery is the proper positioning of the components of the new joint. The surgeon is assisted by the computer to position the components of the new joint accurately, thereby bringing this type of surgery the name  “computer-assisted surgery” . Similar to an autopilot which assists the pilots or a GPRS that aids the driver to reach their destination easily and safely, computer helps the surgeon to achieve the desired accuracy during knee replacement...

FIX THERE IS A PROBLEM PARSING THE PACKAGE ERROR

Android is the most popular Mobile Operating System today. The reason is because of its Versatility, User Friendly and Easy to Use for all Users. There is not Doubt that Most People Prefer Android ahead of other Mobile Operating System. But this Doesn’t Mean you will never Face any Problem or Error while using Android Smartphones. We all like to Install Different apps or Games in our android smartphones but Sometimes while installing you my be Displayed an Error which says “ There is a Problem Parsing the Package ” So if you face this kind of error while Installing any App or Game in your Android smartphone and want to get rid of it, then Do not worry because here in this article i am going to discuss About this error, The Reason and How to Fix it Etc. REASONS OF THERE IS A PROBLEM PARSING THE PACKAGE ERROR The Downloaded .apk file is Currupted or not fully downloaded You might have turned off “Allow installation of apps from Unknown Sources” If the App...

ACL RECONSTRUCTION SURGERY

  Arthroscopic Anatomical ACL Reconstruction During the past decade, the anterior cruciate ligament (ACL) has become a familiar term. The ACL is the main stabilizer of the knee joint during abrupt change in direction. With the increase in sports participation, injury to the ACL has become one of the most common sports injuries. The operative treatment has evolved from open procedures to arthroscopically performed outpatient procedures with early weight bearing. What happens if the ACL is torn? The knee becomes unstable while abruptly changing direction. Many authors have stated that the ACL injury is career ending for the athletes. Ireland calls this a "heart attack of the knee . Why does the ACL fail to heal? Unlike other ligaments about the joint, the ACL passes through the joint and is surrounded by joint fluid. Other ligaments heal by scar formation This fluid is designed to dissolve and prevent blood clotting within the joint Without blood clot, scar tissue does not form. The...