14 Oct 2015

Top 9 Facebook Hacking Techniques And Ways

Facebook is one of the most used social networking site with million users, as a reason if which it has become the number 1 target of hackers have, I have written a couple of post related to facebook hacking here. I mentioned the top methods which were used by hackers to hack facebook accounts, however lots of things have changed in 2015, Lots of methods have went outdated or have been patched up by facebook and lots of new methods have been introduced, So in this post I will write the Top 9 Facebook Profile Hacking Techniques .


1. Facebook Phishing


Phishing still is the most popular attack vector used for hacking facebook accounts, There are variety of methods to carry out phishing attack, In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real facebook page and then asks the victim to login into that page, Once the victim logins through the fake page the victims “Email Address” and “Password” is stored in to a text file, The hacker then downloads the text file and gets his hands on the victims credentials.




2. Keylogging 


Keylogging, according to me is the easiest way to hack a facebook password, Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A keylogger is basically a small program which once is installed on victims computer will record every thing which victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.



3. Stealers


Almost 80% percent people use stored passwords in their browser to access the facebook, This is is quite convenient but can sometimes be extremely dangerous, Stealers are softwares specially designed to capture the saved passwords stored in the victim's browser, Stealers once FOOD can be extremely powerful.



4. Session Hijacking


In a session hijacking attack, connection for a hacker to access victims' accounts on a Web site used to authenticate a user uses the browser cookie stole the victims: an HTTP fees If you are accessing your session hijacking can often be very dangerous, session hijacking is widely used LAN.


5. Sidejacking With Firesheep

The attacker and the victim is on the same WiFi network, but it is still popular now a days, attacks were common in late 2010 Sidejacking, Firesheep side jacking widely used to attack, Firesheep works. HTTP session hijacking attacks as a side jacking another name, but it is targeted by the WiFi users.


6. Mobile Phone Hacking

Millions of Facebook users through their mobile phone to access Facebook. The hacker then perhaps his / her Facebook account can access the victims can access the mobile phone. A cell phone is used to monitor many of them are mobile software.


7. DNS Spoofing 

If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original facebook.com page to his own fake page and hence can get access to victims facebook account.

8. USB Hacking 

If an attacker has physical access to your computer, they just automatically store passwords in the browser program with a function to extract a USB is inserted, you also get access to the link below which can be read by the attack is posted on

9. Man In the Middle Attacks


The victim and the attacker on the LAN and are on a switch based network, a hacker client and server W / B can place himself or he, ARP poisoning capture all traffic because of the default gateway can act as gateways to the other name for the man in the middle attacks, a very broad topic and is beyond the scope of this article.


10.Botnets


Botnets are not commonly used for hacking facebook accounts, because of it’s high setup costs, They are used to
carry more advanced attacks, A botnet is basically a collection of compromised computer, The infection process is 
same as the keylogging, however a botnet gives you, additional options in for carrying out attacks with the 
compromised computer.  Some of the most popular botnets include Spyeye and Zeus.


Previous Post
Next Post

0 comments: