Skip to main content

How To Hack A Facebook Account !



Now a days it is common to hear that someone's facebook account has been hacked. Hacking someone's facebook account means you have to only know his password and that's all. There are numerous methods to hack a facebook account.
                  
 In this article we are going to explain 5 methods  which are commonly used by hackers. Let's go through them one by one.

1• Phishing
This is the most common hacking technique. In this method hackers make a clone of facebook login page. Hackers send the links of this page to the targeted person by e-mail and ask him to login through this page.
                 
            Since this page fake so a recording program is associated with this page which runs in background. When targeted person try to login through this page and enter his user name and password these are recorded by the associated program. Which now becomes easily accessible for hackers.


2. Keylogger
This is the easiest method to hack a facebook account. To use this method first of all hackers install a "keylogger" in victim's computer or smartphone.
      A keylogger is a program which records the keystrokes of victim's keyboard. When facebook login page is opened keylogger becomes active automatically and records the keystrokes used to enter username and password. Then this information becomes accessible for the hacker.

3• Using monitor apps
Now a days we can observe when we signup for whatsapp or reset or facebook password using facebook app in smartphone. An OTP is received by sms which is then automatically accessed by these apps and we don't need to enter it. What is this? These apps can access or read our sms! What if any other third party apps can read our sms? What these apps are called "monitor" apps.
                
 So after installing a monitor app in victim's smartphone hackers try to reset the password and when OTP is received , it is immediately accessed  by monitor apps. What remains? A hackers has done his job.

4• Tabnapping
This method is becoming popular among hackers day by day. As you can see now a days anyone can signup to any new website by using his facebook or google account. When someone signup to these sites through his facebook account , these sites become able to access your account details to setup a new account in there database automatically.
                  
         Hackers make fake sites or fake login pages of most visited sites. When victim use his facebook account to login to these fake site actually they handover their username and password to the hackers.

5• Social Engineering
This is the simplest attack made by a hacker which is in touch with victim. In this method victim's weak password making techniques are used against him. If a person use a simple password like his date of birth, phone number, their  bike's  number etc.
A hackers can easily guess this type of password and can hack victim's facebook account easily.

NOTE : This article is only for information and security purpose. We dont promote such type of activities. Don't be a part of such activity, these are really illegal. http://bitcofarm.com/img/banner1.gif

Comments

Popular posts from this blog

How To Reset Forgotten Pattern Or PIN Of Android Device.

If you forgot the password or pattern that locks your Android device, or a child entered the wrong password, pin code, or pattern enough times that it's now locked, this article will help you. Whatever the reason, if you are unable to recall your phone screen lock then you have to perform a Hard Reset to unlock your Android phone. Hard reset or Hard Reboot is quite easy and can be performed on locked devices but it will erase all your files and data.  To perform the Hard Reset follow the following steps. 1.  Hold the Volume Up and Power button simultaneously (for Samsung Galaxy devices, hold Volume Up + Home + Power). 2. Hold the button combination until you see the word Start (on Stock Android). Samsung devices will load straight into recovery mode. 3.  Use Volume Down to scroll down to “wipe data/factory reset” and press the Power button to select it 4.  Confirm your action and Reboot the device. That's all. Thank You.

Top Hacking Softwares Used By Hackers.

Kali Linux Is a Best Operating System used for Penetration Testing by Ethical Hackers. But it is also misused by Black hats. It consist about  200 inbuilt penetration Tools . You can use Kali Linux and Window both OS in one system by the use of virtual box or Vmware software. You can also make your system double boot, but in this way you can’t use both operating system at one time. But If you are in window you can Use These Tools: Burpsuire  Present for both Windows and Linux. Wireshark It is also present for both Windows and Linux. Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Ophcrack Ophcrack is a password cracking software which are based on rainbow tables.itruns on various operating systems like MAC OS, Unix/Linux, Windows. Rainbowcrack RainbowCrack uses time-memory tradeoff algorithm to crack hashes. It differs from brute force h

How To Become A Hacker

There is no clear cut definition of a Hacker. However  hacker literally means a person who can control a specific thing according to his own way. In field of Computer Science a person is said to be hacker if he knows the art to control a computer even against its own programs. So to become a hacker it is not necessary to have a degree. You only required the skills, intelligence and a attitude to become a successful hacker. However, if you want to become a certified ethical hacker, then you need to pass a course. It is recommended that you pass college through. Hacking is one of the hottest jobs in this decade but don’t take it as an easy job. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on and on. Some people think that a hacker is always a criminal and do illegal activities but they are wrong. Actually many big companies hire hackers to protect their systems and information and they are highly pai