Facebook Hacking 2
Facebook Hacking 2
If you are here to find a way to recover hacked Facebook account then
our facebook recovery article may help you!
To the best of my knowledge there is no such tool, you won’t find it anywhere
and yeah if you google it, you would find many websites claim that they are
providing free hack tool either online or offline but you cannot download the
password file without completing a survey. Even after completing a survey you
get nothing in the end. These things are posted only in the intention of making
money. Don’t waste your precious time in searching such hack tool.
If you want to know how hackers could hack someone’s Facebook account,
please go ahead and read the techniques listed below. The most successful
method among all of these techniques is PHISHING that enables anyone
with no or little technical knowledge to hack Facebook account’s password
easily in few minutes.
Some of the techniques listed below are not only applicable to FB but to all daily
used internet websites like Google, Twitter, Yahoo etc.
This article is made for educating people about how hacking works and how
should they prevent it. Please don’t use these techniques for malicious
purposes.
1 Phishing
Phishing is the most common technique used for hacking FB passwords. It is
easy for anyone who is having little technical knowledge to get a phishing page
done and that is why phishing is so popular. Many people become a victim of
Phishing page due to its trustworthy layout and appearance.
Keeping these questions in your mind should prevent you from getting hacked of
online phishing pages. Also see the below examples of phishing pages.
SSL Certificates (HTTPS) can be obtained from many online vendors, few
vendors give SSL Certificate for Free for 1 year. Its not a big deal for a novice to
create a perfect phishing page like this. So beware of it.
Do you want to make money online with zero investment? Then do read
our blogspot tutorial to know more!
2 Social Engineering
This is the second most common technique of hacking Facebook
accounts. Actually this method shouldn’t come under Hacking since there is no
much knowledge required for this method. I am listing this method under
hacking to ensure the list of most common techniques used for FB account
hacking in their respective order. Social engineering is basically a process of
gathering information about someone whose account you need to hack.
Information like date of birth, their mobile number, their boyfriend / girlfriend’s
mobile number, nickname, mother’s name, native place etc.
Security Question
FB-Social-Engineering-Security-Question
Many websites have a common password reset option called Security Question.
Most common security questions would be “What is your nickname?” , “What is
your 10th grade score?” , “What is your native place?” or any custom questions
defined by user. Obtaining these information from the respective people might
let us hack into their account. Facebook too provides security question as
password recovery option. So if anyone get to know the answer of it, they could
hack account using forgot password option.
Security Question does not let you get into others FB account easily. But setting
a weak password could easily allow any of your friends to hack into your
account. What is a weak password in this scenario? A password which can be
easily guessed by a third person is called weak password. Below are some of
the most common passwords people tend to use in Facebook.
Mobile Number
Nickname / Name and Date of Birth Conjunction
Boy Friend’s Mobile Number / Girl Friend’s Mobile Number – Most of the
lovers
Boy Friend’s / Girl Friend’s Name – Most of the lovers
Boy Friend and Girl Friend Name Combination
Bike Number
Unused / Old Mobile Number
Pet Name
Closest Person Name (can be friends too)
Now be honest and comment here if you are one of the people who have any
one of the common passwords mentioned above. Don’t forget to change your
password before making a comment
Security Question
Very simple. Change your Facebook password now if you have any one of the
weak passwords stated above.
4 Key Logger
Key logger is a software tool used to record keystrokes of a computer or mobile
devices. This in turn records everything you type using your keyboard and store
it for use. Generally key loggers are installed as application software in
operating systems to track key strokes but there are hardware keyloggers as
well. Hardware keyloggers also known as physical keyloggers attached to a
computer in a USB port records everything before it sends the keyboard data to
the computer. There are various mobile key loggers which performs the same in
various operating systems.
How Key Logging works?
All keyloggers run in background (except trail versions) and won’t be viewable to
users until you know the keylogger password and shortcut used to view it. It will
record all the keys pressed and give you a detailed report of when and what keys
are used for what application – Simply a clean report to identify passwords.
Anyone who is reading the keylogger logs might be able to see the Facebook
password or any passwords typed and sensitive information like credit cards,
bank username password etc. Whenever you login to a public computer, there
are chances for you to get your password hacked.
Now a days many people are using mobile key loggers, it enables to track the
keypad of mobile. So any sensitive information typed in mobile could be hacked
easily.
This method don’t let the Facebook hacker / attacker give complete access to
your Facebook account but gives some power to control your account indirectly.
I’ve seen multiple Google Chrome and Firefox add-on which secretly
perform actions like following a person, liking a page on behalf of your Facebook
profile, etc.
All the apps you use in Facebook are owned by third party and not by Facebook.
Of course there are a few exceptions like Instagram. A malicious application
which is requesting your permission could do almost all kind of stuffs in your
Facebook profile.
These are just examples of what could be done. What if the application you are
using is malicious? It could spam your Facebook account with bunch of
worthless content.
You can edit the information that you give to an application in the permission
dialog box (snapshot given above). Also you can review the applications that
have access to your Facebook account here.
You might have seen or downloaded many Facebook account hacker software
but none of them could truly hack Facebook password. Hacking your Facebook
password is what it actually does.
There are a hell lot of mobile applications that secretly steals Facebook access
token from your mobile device. Facebook mobile app functions through API
where accesstoken stored in your mobile’s internal memory is used for
authentication. It is more like your username and password. So if someone
steal your accesstoken then they are likely to have full access to your Facebook
account.
How malicious mobile application software works?
Facebook Application Interface do not require username or password everytime
to get user data, it just needs secret accesstoken to retrieve a user’s data.
Facebook mobile app stores the access token in mobile’s memory. This app’s
part of memory should be accessed only by the application. Mobile apps that
has administrative privilege can access other app’s data. For example, gaining
admin privilege in a rooted android phone could allow an application to steal
your Facebook access token. A hacker can do a lot of malicious things if they
get your Facebook access token.
9 Browser Vulnerabilities
Browser Vulnerabilities are security bugs which exists in older versions of mobile
and desktop browsers.
Also read our how to Unblock YouTube, Facebook and other websites easily
10 Self XSS Scam
Self XSS also known as Self Cross Site Scripting. XSS is basically a web security
vulnerability, it enables hackers to inject scripts to web pages used by other
users. What is self XSS then? Self XSS is a kind of social engineering attack
where a victim accidentally executes a script, thus exploiting it to the hacker.
11 Trojan Horses
Trojan Horse is a malicious program which is used to spy and control a
computer by misleading users of its true intent. Malware Trojan can also be
called as Remote Key Logger since it records key strokes of all the applications
of our computer and send it to the hacker online.
Having an updated anti-virus software do not guarantee you to stay safe from
hacking. Basically an anti-virus software is a collection of detected malware and
viruses. Its job is to compare each and every file with their database of viruses.
There are many softwares which enable us to create a undetectable Trojans. But
it is very unlikely to target a common man with undetectable Trojanware. So
having a updated antivirus program is some what protective. Don’t forget to
update your anti virus software once their is an update available.
12 FB Zero Day
Zero day is a security vulnerability that are unknown to the respective software
vendor. In our context, Undiscovered Facebook vulnerabilities are called
Facebook Zero Day.
Get all the secret hacks directly to your inbox for free of cost.
First Name
Subscribe
Please feel free to share your comments and feedback. Thank you for bearing all
my poor grammar mistakes