- Types of medhods of Facebook Hacking .........
Facebook Phishing
Phishing is still most common type of assault used for hacking Facebook account. There are several strategies for carrying out of a phising attack.Key-logging
Key-logging is the easiest way to hack a Facebook password. Key-logging sometimes can be so dangerous that even a person with good knowledge computers can fall for it.- Runs on computer operating system.
- Device connected to the keyboard.
Stealers
Almost 80% people use stored passwords in their browser to access Facebook. This is very convenlents for you, but can be extremely dangerous as stealers can easily access your saved passwords stored in browser.- Password manager automatically fill out important forms without you having to type anything in and keeps your passwords safe.
- When the "remember passwords" prompts comes up and you are not on your own computer, click on the "not now" button.
Session Hijacking
Sesion Hijacking can be often very dangerous if you are accessing Facebook on a http:// connection. In Session Hijacking attack a hacker steal the victims browser cookie which is used to authenticate a user on a website and uses to it to access victims account. Session Hijacking is widely used on L's.- Using Firefox add-on called "Force TLS" or if you are using Chrome then use "KB SSL Enforcer". Both will automatically redirect you to secured page of the sites you visit.
Side Jacking / Fire-sheep
Side-jacking is a popular method for hacking Facebook and email accounts. It's the process of stealing someone's access too a website, typically done on wireless public networks.- Using Firefox add-on called "Force TLS" or if you are using Chrome then use "KB SSL Enforcer". Both will automatically redirect you to secured page of the sites you visit.
Mobile Phone Hacking
Millions of Facebook users access Facebook through their mobile phones. If the hackers can gain access to Victims mobile phone then he can probably gain access to his/her Facebook account. There are lots of Mobile Spying software used to monitor a cellphone.- Confirm your mobile number Confirming your mobile number is one of many ways to enhance your account security on Facebook. This way, even you lose or forget your password, Facebook will able to send you a new one via SMS.
- Code Generator for Android phones If you use an android phone, you can set up an extra layer of security by having to enter a code every time you access Facebook through the app.
Man In The Middle Attack
If the Victim and Attacker are on the same LAN and on a switch based network, a hacker can place himself between the client and the server, or he could also act as a default gateway and capturing all the traffic in between.USB Hacking
If an Attacker has physical access to your computer, He or she could insert a USB stick that is programmed with a function to automatically extract saved passwords in the browser.- Do not leave your laptop unattended.
- Install software that tells your computer not to accept unrecognized Devices.
DNS Spoofing
If the victim and attacker are on the same network, an attacker can use DNS Spoofing attack and change the original facebook.com page to his own fake page and Hence can get access to victim's Facebook account.
#1 A basic Facebook phishing attacks works like this, A hacker makes a fake login page which precisely resembles the genuine Facebook pageThis is also called as "Social Engineering"
#2 An email is sent asking the victim to login into that page.
#3 Once the victim logins through the fake page the victims "Email Address" and "Secret Word" is put away into a content record.
#4 Then finally, the hackers download the content document and get the victims "user id" and "Password".
A key-logger is basically a small program which once is installed on victim's computer it will record everything which the victim Types the "user id", "passwords", or "any other things" on his or her computer.
The logs are then sent back to the attacker by either TP or directly to the hacker's email address.Two methods of keylogging
#1 Software key logger:
#2 Hardware Keylogger:
How to combat Facebook hacking via stealers:
#1 Use Password Manager#2 Avoid saving passwords on browsers:
The Hackers hijacks the network connection and gathers information that's being exchanged between the Victim and the Server, But victim is unaware that their connection is being unwatched.
How to combat Session Hijacking
Fire-sheep is widely used to carry out Side-jacking attacks and works when the attacker and victim is on same WiFi network. A side-jacking attack is basically another name for HTTP Session Hijacking, but it's more targeted towards WiFi users.
How to combat Session Hijacking
How to combat Facebook Mobile Phone Hacking:
The attackers secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
Man in the Middle (Hacker) observes secretly every things that communicate between Client and Server.
How to combat USB Hacking:
0 Comments