0% found this document useful (0 votes)
30 views6 pages

How To Hack Facebook

The document provides information on various ways to gain access to someone else's Facebook account without permission, including using social engineering techniques, keyloggers, website spoofing, intercepting emails, cracking passwords, session hijacking, acting as a proxy server, and conducting Google searches. The document also offers tips to prevent Facebook accounts from being hacked.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views6 pages

How To Hack Facebook

The document provides information on various ways to gain access to someone else's Facebook account without permission, including using social engineering techniques, keyloggers, website spoofing, intercepting emails, cracking passwords, session hijacking, acting as a proxy server, and conducting Google searches. The document also offers tips to prevent Facebook accounts from being hacked.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

HOW TO HACK FACEBOOK

How to hack Facebook or hack someone else's Facebook password has become knowledge that
Many people are cool, especially Facebook users, why? I don't know either.
Why do people want to know how to hack someone else's Facebook password (hacking Facebook)?
In fact, this method is considered a way to steal someone's Facebook account or password.
I'm personally curious to know how to hack Facebook just out of curiosity.
although it might ultimately be applied to hack someone else's facebook
especially those who hacked our facebook first.
Therefore, if you want to know how to hack someone else's Facebook password, make sure
not used for evil or anything that could harm others, if merely wanting
It doesn't become a problem as long as we are preceded; perhaps there is nothing wrong with giving.
hacking back with shockterappy There are several ways to hack someone else's Facebook password,
usually if facebook gets hacked the account owner cannot login because of the password
or the Facebook email always does not work after being hacked
In my opinion, hacking someone else's Facebook is completely useless, at most we
just peeking at the photos of the Facebook account owner, email address, and other missing data
it's beneficial for us, if it's just for fun to mess with friends or partners, maybe it's okay
just don't go overboard. OK for those of you who are curious about how to hack
facebook someone else after some time I also wrote about how to hack
how to hack someone else's facebook with a keylogger
in another way:
1. Please download the following Facebook Frezer:Downloadwith the password: yurieke.
or you can also Download FACEBOOK Account Hacker Version 2.4 and Version 2012:

Facebook Hacker Link 1Download


Facebook Hacker Link 2 =Download
Facebook Hacker Link 3Download
Facebook Hacker Link 4=Download
Facebook Hacker Link 5=Download
Facebook Hacker Link 6=Download
Facebook Hacker Link 7=Download
Facebook Hacker Link 8=Download
Facebook Hacker Link 9=Download
Facebook Hacker Link 10=Download
Facebook Hacker Link 11=Download
Facebook Hacker Link 12=Download
Facebook Hacker Link 13=Download
Facebook Hacker Link 14=Download
Facebook Hacker Link 15=Download
Facebook Hacker Link 16=Download
Facebook Hacker Link 17=Download
Facebook Hacker Link 18=Download
Facebook Hacker Link 19=Download
Facebook Hacker Link 20=Download
Facebook Hacker Link 21 =Download
Facebook Hacker Link 22 =Download
Facebook Hacker Link 23=Download
Facebook Hacker Link 24=Download
Facebook Hacker Link 25 =Download
Facebook Hacker Link 26 =Download
Facebook Hacker Link 27 =Download
Facebook Hacker Link 28 =Download
Facebook Hacker Link 29=Download
Facebook Hacker Link 30 =Download
2. Run the program to block Facebook account owners from logging in with their password
If the program has stopped, the owner of Facebook can access their account.
This method is the easiest way to hack someone else's Facebook or if you want.
You can see how to hack Facebook passwords with a keylogger in the previous post.
What is the use of hacking someone else's Facebook if we ourselves do not like it when...
hacked
Tips to prevent Facebook from being easily hacked by others:
Password theft and account takeover are frequent occurrences in the world.
cyber. It's not hard to do, but many newbies just keep on.
asking. . “How to get someone else's email password?” or questions
The most common thing I receive is.. 'How did you get my password?'
This article is written to answer those questions, hopefully it can add to your knowledge.
and opens your mind about how important it is to manage your account while being in
vulnerable places.
How to Get It? ...
There are many ways to obtain a password. Some of them do not
requires special skills. Here are the most common and frequently used ways
used : …..
Social Engineering
KeyLogger
Web Spoofing
Intercepting Email
Password Cracking
Session Hijacking
Becoming a Proxy Server
Exploiting User Carelessness in Feature Browser Usage
Googling
Social Engineering
Social Engineering is the name of a technique for gathering information by utilizing
the psychological gap of the victim. Or it could also be referred to as 'social deception'
Engineering requires patience and caution so that the victim does not become suspicious. We
demanded to be creative and able to think like the victim.
Social Engineering is the art of "forcing" others to do something according to
with your hope or desire. Of course, the 'coercion' that is done is not in a
openly or outside the normal behavior usually exhibited by the victim. Human
tend to trust or be easily influenced by people with big names,
ever (or currently trying) to provide assistance, and having words or
a convincing appearance. This is often exploited by social engineering perpetrators to
entraps its victim. Often the perpetrator creates a condition so that we have
a kind of dependency on him. Yes, without us realizing it, he conditions us in
a problem and makes it seem as if only he can solve that problem.
Thus, we will certainly tend to follow what he instructs without
feeling suspicious.
Social Engineering can sometimes be a serious threat. It seems that there is no connection.
with technology, but social engineering is still worth watching out for because it can have consequences
fatal for your system. Why?? Because in any case a computer is still not
can escape from humans. Yes, there is not a single computer system on this Earth that can
free from human intervention. no matter how great your defenses are, if you have already been conquered
by the attacker through social engineering, it could be that you yourself are the one who opened it
an entry point for the attacker.
KeyLogger
KeyLogger is software that can record user activity. The recorded results are usually
stored in the form of text or images. KeyLogger works based on the user's keyboard keystrokes.
This application is capable of recognizing sensitive forms such as password forms.
There are safe ways to avoid keyloggers:
1. Use passwords with special characters such as !@#$%^&*(){}[]. Most
the keylogger will ignore this character so that the perpetrator (the one who installs the keylogger) will not
will get your actual password.
2. Prepare the password from home, store it in text form. When you want to enter it.
password, just copy-paste it. Keylogers will read your password based on
keyboard tapping. However, this method is somewhat risky. Why? Because when you do it
copy, your data will be saved to the clipboard. Currently, there are many software programs available.
free software that can display data in the clipboard.
Web Spoofing
Do you still remember the case of the theft of the accounts of several Bank BCA customers? Yes, that is one of the
a real example of Web spoofing. The essence of this technique is to exploit mistakes
When a user types a website address into the address bar. Essentially, Web Spoofing is
efforts to deceive the victim into thinking they are accessing a certain site, when in fact
no.
In the case of BCA bank, the perpetrator created a site that is very similar and identical to the site.
actually so that the deceived victim will not hesitate to provide information
sensitive like the username and password. In fact, because the site is a site
deception, so all the valuable information was recorded by the fake web server, which belongs to the ...
actor.
Blocking Email
Blocking emails? Yes, and it's very easy to do this. One way is
by using mailsnarf which is part of the dsniff utility. The way Mailsnarf works is
by intercepting data packets passing through the Internet and assembling them into an email
whole.
Dsniff and mailsniff are software that operate based on WinPcap (equivalent to libcap.
on Linux) is a library that captures data packets. The packets that
this will be saved in file format by Windump, while Dsniff and
MailSnarf goes further by analyzing these data packets and displaying
password (dsniff) or email content (mailsnarf).
Password Cracking
"Hacking while sleeping." that is the expression commonly used by people who
performing password cracking. Why? Because usually the time required
It takes a long time to do password cracking. It can take hours, even days! All of that
depending on the target, whether the target uses a common password, password
has an unusual character length, or the password has a combination with
special characters.
One of the software commonly used to do this is by using
Brutus, one of the well-known types of remote password cracker software. Brutus
working with dictionary attack techniques or brute-force attack against HTTP ports,
POP3, FTP, telnet, and NetBIOS.
A Dictionary Attack works by trying words that are in the password dictionary.
While a brute-force attack works by trying all combinations of letters and numbers,
or character.
Brute Force Attack works very slowly and takes a long time depending on
the type of computer specifications and the length of the password characters. Currently, there are many sites
that restricts access to the login attempts that are continuously not
successful.
Session Hijacking
Session hijacking is increasingly rampant among attackers these days.
It is usually done by imitating cookies. So in essence, we must be able to
imitating the victim's cookies to gain access to their login session.
So how do you get the victim's cookies?
1. With cookie analysis.
This method is relatively difficult to implement.
2. Stealing Cookies.
For example, the Attacker wants to obtain account A. The Attacker can easily do so.
create a kind of JavaScript script that is embedded in an email to be sent to
victim.When the victim opened the email, unknowingly their cookies would be stolen and recorded to
a web server utilizing a PHP script.
Recently, the most targeted account is Friendster. Some people have been
inserting a script through a testimonial, some people insert it into their own profiles
to steal the victim's cookies and so on. I have tips for this:
1. Do not use Internet Explorer browser.
When you want to open someone else's profile, do not use Internet Explorer. Note the address
the profile you want to see, please log out from your account and clear everything
cookies, then open the Friendster profile you want.
2. Check the source code
When receiving testimonials, first check the source code. Is there anything there?
foreign scripts or words that are identical to piracy such as:
“HACKED”, “DEFACED”, “OWNED”.. dll..
If in doubt....... just reject it.

3. LogOUT suddenly.
Be cautious when you suddenly log out by yourself without any clear reason from
your account. When you are asked to enter a username and password, first check the address bar
Hey! Are you on the right site or not? Check the source code.
Look at the form action, where your information will be sent.
Actually, session hijacking can be prevented if the service provider pays attention.
the following things:
Establishing a unique session identifier
2. Establishing a random patterned identifier system
3. Independent session identifier
4. Session identifier that can be mapped with the connection
client side.
Another phenomenon is that, up until the publication of this article, there are still many findings.
for users who do not sign out after opening their account. Thus,
someone else using that computer and opening the same website as
will be opened by the first person will automatically log into the victim's account.
Becoming a Proxy Server
We can gather information by becoming a proxy server for the victim to be able to
surfing. By becoming a proxy server, the entire identity of the surfer can become
ours.
Exploiting user negligence in the use of browser features
Each browser certainly has features aimed at ease and comfort.
users while surfing. Among them are the existence of cache and Password
Manager.
On the Internet, there are certainly many websites whose content does not change for several days.
(For example, spyrozone.tk, hehehe. Well, for sites like this, cache becomes an issue.
which is very useful. The cache will store the files generated from browsing so that later if
you visit the site again the browser no longer needs to download for
the second time from the server so that every page of the site you have previously opened
will open faster. All of this is usually controlled by the time to live header.
Well, what about news provider sites that are always up to date? For the site that
like that, the time to live will be set to 0 so that you will continue to do
download every time you visit.
Isn't it quite comfortable? Yes, but threats are starting to arise. Now try to explore the options.
related to the cache on your browser. Surely you can find that there is
facility to determine how large the temporary file that can be stored on the hard disk.
Also look for the location where the files will be saved.
Try opening that folder, you will find html files & image files from
the sites you have visited. In IE Browser, you can view the location of the cache file
by exploring the Tools menu -> Internet options -> Settings
So what can be obtained?? It's just 'trash' files?? Hmm... now try to
Copy all the files that are there to a folder. Then open one of the HTML files. If
It is a public computer, you can see what sites have been accessed by people.
before you.
Hmm.. just by looking at your temporary files, you can even see passwords and others.
I have encountered many sites that store passwords and display them in the URL. Of course
You must have often read it in various tutorials.
Most browsers nowadays have the facility to store passwords. For example
When using Mozilla Firefox, you must often receive a confirmation dialog box that
asking if you want your password to be saved by PasswordManager.
Most users tend to choose the YES option, whether it's with full awareness or
Indeed, they do not know (read: do not want to know) what the meaning of that dialog box is.
Other people who then use the browser can easily obtain
password victim by entering the menu Tools —> Options —> Security –> Saved
password.
Another example is the password wand feature possessed by the Opera browser. When you
entering username and password on a form and pressing the submit button, opera
by default will ask for confirmation from you whether you want the browser to save
your ID and password or not. Again and again... most internet users are careless, they
tend to choose the 'YES' option.
Then?? Other people who use that browser can see which sites that
accessed by the user, direct the browser to the site, place the cursor on the input form
user name, press [ALT]+[ENTER] and BOOOMM!!!! Why?? Don't be surprised yet!!
Hehehe.. the login form will automatically be filled with the victim's username along with
the password ;D (It’s fun enough..
This is just a small example, explore other browser features!
Googling
Google.com. Many sites have already collapsed, passwords and credit card numbers
that was stolen due to the actions of someone who abused their powers. In the past, this was easy
done. Just by typing certain keywords related to the user name
and password, you can harvest hundreds of user passwords through Google. But now
It seems you will have to bite your nails if you use the method above ;D
Don't be sad yet because Google has just launched its new product, which is Google Code.
Search. A new threat is starting to emerge, this 'smart' one can now crawl up to
archive file that is located in the web server's public directory. Be careful for those who have the habit of
store important information within it (passwords, and other valuable information) It is advisable
from now on that habit is eliminated. Always protect sensitive folders so that
your site can live longer. If not... well.. just wait for someone who
utilizing this new google product to extract sensitive information from web servers
you. and if that has happened... then be ready.. your "playground" will be taken over
by him.

You might also like