Pages

Thursday 27 March 2014

Real ways of hacking a facebook account in 2014

WWW.FACEBOOK.COM A viral website on the internet that is very much popular now a days for it's social environment.Many peoples asks me how to hack facebook account.They asks me to provide them with a link of softwareS that are used for hacking facebook account.What I believe is that they want something like this:


Let me clear it first that there exists nothing like facebook account hacker etc in which you have to provide your email, victims email and some basic info and within a flick of a second you will be provided with a legitimate password.
THIS IS ALL FAKE.THERE IS NOT A SINGLE LEGITIMATE SOFTWARE LIKE THIS.



There are few methods and with the help of these methods , if you will execute them properly, as I will teach you will be able to learn and implement facebook hacking.So without wasting anymore time I will share with you the most authentic tricks.
Facebook can be hacked by the basic following ways:

  1. Facebook phishing 
  2. Keylogging
  3. Tab napping
  4. Stealer


Facebook Phishing:
The most commonly used method to hack facebook is phishing as it requires no rocket science and is also very easy.Hackers hack facebook by this method by cerating a fake login page and asks victims to proceed through this facebook and by fooling him/her asks them to login with his/her credentials.Once the victims logins with his credentials he gets ruined because all his private stuff, data etc is now under the control of the hacker as he has recieved all the credential information.Chances of hacking via this method is great because most of the users cannot distinguish between an authentic website and non-authentic website.

Keylogging: 
Keyloggin is the most easiest method of hacking facebook accounts.Its just like cerating a package(Virus program) and then sending it to the user.Creating a package is not a tough job it's just like installing a software on your Pc.It is important that your package is FUD(fully undetectable) so that antivirus would not be able to detect it and victim would be fooled by installing the package on his pc.It works in a way that once you send the package by emailing, IM or by facebook etc (Don't send the package directly my advice is to upload it to either 4shared or any other cloud storage website and then send the link of that package to the victim so that facebook would interrupt) and when victim would install the package whenever whatever he would type using his keyboard would be mail to you. So in this way if he types in the credential of his account then it would be mail to you.The best and preferred keyloggers include :

  • Ardamax keylogger 
  • SniperSpy keylogger
  • Winspy keylogger


Tab napping: 
Tabnapping is the advance foam of phishing or modified form of phishing.In tabnapping the hacker gives you a link of any regular website (not necessarily facebook, gmail or any other social website as in the case of phishing)and when you click the website it seems legit for example a website with some funny video clips was sent to you and you decided to watch any video and since it is buffering you shifted your tab to facebook or anyother website and started surfing.The code works in a way that it checks if any of the open tabs is inactive for a set time interval then it should be replaced with the fake page of either gmail, hotmail or facebook. So in this way victim would be fooled by thinking that either he has been kicked out of gmail, facebook,hotmail(depends on the fake page) because of his inactivity.Thus, after filling the credential the victim has been hacked.

Stealer:
This attack works for those victims who usually stored password in their browsers.It is almost same as keylogging method  like again you have to create a package and send it's link to the user.Basically Stealers are software's specially designed to capture the saved passwords stored in the victims browser, Stealers once FUD can be extremely powerful.

Conclusion: 
These were the basic methods by which hacker gains unauthorized access to your fb, social websites or any other website.In this tutorial I have shared with you the methods of hacking not the procedure.Keep yourself updated and I will share the detailed procedure of hacking in an easy way step by step via each of these methods.If you have liked my article or post then do share it with others and do comment if you have any queries or complements :P.
Take care see you next time.

No comments:

Post a Comment