Types of Hacking Methods

  • Types of medhods of Facebook Hacking .........


    1. Facebook Phishing

    2. Phishing is still most common type of assault used for hacking Facebook account. There are several strategies for carrying out of a phising attack.
      #1 A basic Facebook phishing attacks works like this, A hacker makes a fake login page which precisely resembles the genuine Facebook page
      #2 An email is sent asking the victim to login into that page.
      #3 Once the victim logins through the fake page the victims "Email Address" and "Secret Word" is put away into a content record.
      #4 Then finally, the hackers download the content document and get the victims "user id" and "Password".
      This is also called as "Social Engineering"
    3. Key-logging

    4. Key-logging is the easiest way to hack a Facebook password. Key-logging sometimes can be so dangerous that even a person with good knowledge computers can fall for it.
      A key-logger is basically a small program which once is installed on victim's computer it will record everything which the victim Types the "user id", "passwords", or "any other things" on his or her computer.
      The logs are then sent back to the attacker by either TP or directly to the hacker's email address.
      Two methods of keylogging
      #1 Software key logger:
      • Runs on computer operating system.
      #2 Hardware Keylogger:
      • Device connected to the keyboard.

    5. Stealers

    6. Almost 80% people use stored passwords in their browser to access Facebook. This is very convenlents for you, but can be extremely dangerous as stealers can easily access your saved passwords stored in browser.
      How to combat Facebook hacking via stealers:
      #1 Use Password Manager
      • Password manager automatically fill out important forms without you having to type anything in and keeps your passwords safe.
      #2 Avoid saving passwords on browsers:
      • When the "remember passwords" prompts comes up and you are not on your own computer, click on the "not now" button.

    7. Session Hijacking

    8. Sesion Hijacking can be often very dangerous if you are accessing Facebook on a http:// connection. In Session Hijacking attack a hacker steal the victims browser cookie which is used to authenticate a user on a website and uses to it to access victims account. Session Hijacking is widely used on L's.
      The Hackers hijacks the network connection and gathers information that's being exchanged between the Victim and the Server, But victim is unaware that their connection is being unwatched.
      How to combat Session Hijacking
      • Using Firefox add-on called "Force TLS" or if you are using Chrome then use "KB SSL Enforcer". Both will automatically redirect you to secured page of the sites you visit.

    9. Side Jacking / Fire-sheep

    10. Side-jacking is a popular method for hacking Facebook and email accounts. It's the process of stealing someone's access too a website, typically done on wireless public networks.
      Fire-sheep is widely used to carry out Side-jacking attacks and works when the attacker and victim is on same WiFi network. A side-jacking attack is basically another name for HTTP Session Hijacking, but it's more targeted towards WiFi users.
      How to combat Session Hijacking
      • Using Firefox add-on called "Force TLS" or if you are using Chrome then use "KB SSL Enforcer". Both will automatically redirect you to secured page of the sites you visit.

    11. Mobile Phone Hacking

    12. Millions of Facebook users access Facebook through their mobile phones. If the hackers can gain access to Victims mobile phone then he can probably gain access to his/her Facebook account. There are lots of Mobile Spying software used to monitor a cellphone.
      How to combat Facebook Mobile Phone Hacking:
      • Confirm your mobile number
      • Confirming your mobile number is one of many ways to enhance your account security on Facebook. This way, even you lose or forget your password, Facebook will able to send you a new one via SMS.
      • Code Generator for Android phones
      • If you use an android phone, you can set up an extra layer of security by having to enter a code every time you access Facebook through the app.

    13. Man In The Middle Attack

    14. If the Victim and Attacker are on the same LAN and on a switch based network, a hacker can place himself between the client and the server, or he could also act as a default gateway and capturing all the traffic in between.
      The attackers secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
      Man in the Middle (Hacker) observes secretly every things that communicate between Client and Server.

    15. USB Hacking

    16. If an Attacker has physical access to your computer, He or she could insert a USB stick that is programmed with a function to automatically extract saved passwords in the browser.
      How to combat USB Hacking:

      • Do not leave your laptop unattended.
      • Install software that tells your computer not to accept unrecognized Devices.

    17. DNS Spoofing

    18. If the victim and attacker are on the same network, an attacker can use DNS Spoofing attack and change the original facebook.com page to his own fake page and Hence can get access to victim's Facebook account.

Post a Comment

0 Comments