Skip to main content
Facebook is one of the most widely used social networking site with more than 750 million users, as a reason if which it has become the number 1 target of hackers, I will write a couple of post related to facebook hacking here at EHTIS, In my post which I have written in 2011 related to facebook hacking and security 4 ways on How to hack facebook password, I have mentioned the top methods which were used by hackers to hack facebook accounts in 2010, however lots of things have changed in 2011, Lots of methods have went outdated or have been patched up by facebook and lots of new methods have been intro
duced, So in this post I will write the top 10 methods how hackers can hack facebook accounts in 2010.
__________________________________________________________________________
10 Ways How Hackers Can Hack Facebook Accounts In 2011
__________________________________________________________________________
So here are the top 10 methods which have been the most popular in 2011:
__________________________________________________________________________
1. Facebook Phishing
__________________________________________________________________________


Phishing still is the most popular attack vector used for hacking facebook accounts, There are variety of methods to carry out phishing attack, In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real facebook page and then asks the victim to login into that page, Once the victim logins through the fake page the victims "Email Address" and "Password" is stored in to a text file, The hacker then downloads the text file and get's his hands on the victims credentials.

I will explain on my next post the step by step phishing process:

How To Hack Facebook Password
_________________________________________________________________
2. Keylogging
_________________________________________________________________
Keylogging, according to me is the easiest way to hack a facebook password, Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A keylogger is basically a small program which once is installed on victims computer will record every thing which victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address. I will dedicate a half of my newsest book that i intend to launch in 2012"An introduction to keyloggers, RATS And Malware" to this topic.


________________________________________________________________
3. Stealers


Almost 80% percent people use stored passwords in their browser to access the facebook, This is is quite convenient but can sometimes be extremely dangerous, Stealers are software's specially designed to capture the saved passwords stored in the victims browser, Stealers once FUD can be extremely powerful. If you want to how stealers work and how you can set up your own one?, Kindly refer the book above.

__________________________________________________________
4. Session Hijacking
__________________________________________________________





Session Hijacking can be often very dangerous if you are accessing Facebook on a http:// connection, In a Session Hijacking attack a hacker steals the victims browser cookie which is used to authenticate a user on a website and uses to it to access victims account, Session hijacking is widely used on Lan's. I have already written a three part series on How session hijacking works? and also a separate post on Facebook session hijacking.
__________________________________________________
5. Sidejacking With Firesheep
__________________________________________________




Sidejacking attack went common in late 2010, however it's still popular now a days, Firesheep is widely used to carry out sidejacking attacks, Firesheep only works when the attacker and victim is on the same wifi network. A sidejacking attack is basically another name for http session hijacking, but it's more targeted towards wifi users.

To know more about sidejacking attack and firesheep, read the post mentioned below:
Firesheep Makes Facebook Hacking Easy
_________________________________________________________
6. Mobile Phone Hacking
_________________________________________________________




Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are lots of Mobile Spying softwares used to monitor a Cellphone.

The most popular Mobile Phone Spying softwares are:

1. Mobile Spy
2. Spy Phone Gold
_______________________________________________________________
7. DNS Spoofing
_______________________________________________________________



If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original facebook.com page to his own fake page and hence can get access to victims facebook account.

______________________________________________________________
8. USB Hacking
______________________________________________________________


If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the browser, I have also posted related to this attack which you can read by accessing the link below:


Usb password stealer To Hack Facebook Passwords
___________________________________________________
9. Man In the Middle Attacks
___________________________________________________

If the victim and attacker are on the same lan and on a switch based network, A hacker can place himself b/w the client and the server or he could also act as a default gateway and hence capturing all the traffic in between, ARP Poisoning which is the other name for man in the middle attacks is a very broad topic and is beyond the scope of this article, We have written a couple of articles on man in the middle attacks which canb be accessed from the links mentioned below:
Man In the Middle Attacks With SSL Strip
________________________________________________________
10. Botnets
________________________________________________________


Botnets are not commonly used for hacking facebook accounts, because of it's high setup costs, They are used to carry more advanced attacks, A botnet is basically a collection of compromised computer, The infection process is same as the keylogging, however a botnet gives you, additional options in for carrying out attacks with the compromised computer. Some of the most popular botnets include Spyeye and Zeus.

Comments

  1. If the internet exporer is set to delete history on closure, are the cookies that could be used to steal a session not deleted too?

    ReplyDelete

Post a Comment

Popular posts from this blog

Hass avocado farming in Kenya

Hass avocado farming in Kenya has become the new craze due to its extensive European market. Farmers today have lots of concern on where to source for quality certified hass avocado seedlings in Kenya , Nurseries such as the ones owned by Farmers Trend have been a good source for the seedlings and better information. To get quality hass avocado seedlings, contact https://farmerstrend.co.ke/ on 0790509684 Buy hass avocado seedlings at an affordable from a reputable certified seedbed in Kenya. Contact John Kiruthi on 0790-509684 Prices range from 150/= to 400/= per pc This post is a result of many queries that we get on this platform on where one can source hass avocado seedlings in Kenya. The Hass avocado season runs from June to mid – September with other varieties like Fuerte avocado starting a little earlier in March/April. The nursery imports its Hass shoots from South Africa and grafts them with locally available indigenous avocado seedlings for root stock. T...

Hack an Ethernet Router(ADSL)

Hack an Ethernet Router(ADSL) ADSL(Asymmetric Digital Subscriber Line) ethernet routers are used by many people across the world because it is efficient in many ways,But it is also the more vulnerable to the network,The most serious vulnerability which can easily be exploited by an hacker(a beginner also ) is…….. In first every ADSL Ethernet router comes with a USERNAME and PASSWORD using which it is possible to gain access to the router settings and configure the device. The vulnerability actually lies in the Default username and password that comes with the factory settings. Usually the routers come preconfigured from the Internet Service provider and hence the users do not bother to change the password later. This makes it possible for the attackers to gain unauthorized access and modify the router settings using a common set of default usernames and passwords. Here is how you can do it. U need some tools like PORT SCANNE R which you can download here 1.You need some ip addr...

Easy tools to Improve SEO Ranking For Your Website In Kenya by 2023

SEO tools save you from tedious keyword research and data analysis. With these tools, you’re able to see what’s working and which parts of your strategy could benefit from some tweaking. The best SEO tools also provide reports about how you measure up to competitors and where the greatest opportunities lie. What’s more, they allow you to measure search performance countries, regions, or languages. It gets better. If you’re managing more than one website, SEO tools can help you assess each site’s performance on the fly. Many entrepreneurs with multiple websites end up putting a lot of data in spreadsheets and analyzing it manually. But that soon becomes overwhelming and raises the risk of the reports being inaccurate. Fortunately, you can use SEO software to save hours of effort and generate accurate reports at a click. Best Search Engine Optimization (SEO) Tools 1. Ahrefs: SEO Keyword Tool Ahrefs is o...